Arbitrary Command Execution in Jenkins Perfecto Plugin by CloudBees
CVE-2020-2261
8.8HIGH
Summary
The Jenkins Perfecto Plugin, up to version 1.17, suffers from a vulnerability allowing attackers with Job/Configure permissions to execute arbitrary commands on the Jenkins controller. This security flaw exposes systems to unauthorized command execution, potentially leading to significant damage and data compromise. Users are at risk of exploitation, emphasizing the need for immediate updates to mitigate this issue.
Affected Version(s)
Jenkins Perfecto Plugin <= 1.17
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved