First published: Wed Jan 15 2020(Updated: )
Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Sounds | <=0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2097 is rated as a high severity vulnerability due to its potential to allow arbitrary OS command execution.
To fix CVE-2020-2097, update the Jenkins Sounds Plugin to version 0.6 or later.
Versions 0.5 and earlier of the Jenkins Sounds Plugin are affected by CVE-2020-2097.
Attackers with Overall/Read access can exploit CVE-2020-2097 to execute arbitrary OS commands.
CVE-2020-2097 allows an attacker to execute arbitrary OS commands as the OS user account running Jenkins.