First published: Wed Jan 15 2020(Updated: )
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Amazon Ec2 | <=1.47 | |
maven/org.jenkins-ci.plugins:ec2 | <1.48 | 1.48 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2090 is a cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier.
CVE-2020-2090 allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
CVE-2020-2090 has a severity rating of 8.8 (high).
To fix CVE-2020-2090, upgrade Jenkins Amazon EC2 Plugin to version 1.48 or later.
You can find more information about CVE-2020-2090 on the Jenkins Security Advisory page: https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1004