First published: Wed Jan 24 2018(Updated: )
Users with permission to create or configure agents in Jenkins 1.37 and earlier could configure an EC2 agent to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of these agents now requires the 'Run Scripts' permission typically only granted to administrators.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ec2 | <=1.37 | |
maven/org.jenkins-ci.plugins:ec2 | <=1.37 | 1.38 |
<=1.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000502 is considered a high severity vulnerability due to its potential to allow unauthorized execution of shell commands.
To fix CVE-2017-1000502, upgrade Jenkins EC2 plugin to version 1.38 or later.
CVE-2017-1000502 affects users with permissions to create or configure agents in Jenkins versions 1.37 and earlier.
CVE-2017-1000502 allows the execution of arbitrary shell commands on the master node when launching misconfigured EC2 agents.
Mitigating CVE-2017-1000502 requires granting the 'Run Scripts' permission to control agent configuration.