Arbitrary Command Execution in Jenkins Perfecto Plugin by CloudBees
CVE-2020-2261

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
16 September 2020

Summary

The Jenkins Perfecto Plugin, up to version 1.17, suffers from a vulnerability allowing attackers with Job/Configure permissions to execute arbitrary commands on the Jenkins controller. This security flaw exposes systems to unauthorized command execution, potentially leading to significant damage and data compromise. Users are at risk of exploitation, emphasizing the need for immediate updates to mitigate this issue.

Affected Version(s)

Jenkins Perfecto Plugin <= 1.17

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.