First published: Mon Mar 09 2020(Updated: )
A cross-site request forgery vulnerability in Jenkins Mac Plugin 1.1.0 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Mac | <=1.1.0 | |
maven/fr.edf.jenkins.plugins:mac | <1.2.0 | 1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2147 is classified as a high severity vulnerability due to its potential for unauthorized access.
To fix CVE-2020-2147, upgrade the Jenkins Mac Plugin to version 1.2.0 or later.
If exploited, CVE-2020-2147 allows attackers to connect to an attacker-specified SSH server with attacker-controlled credentials.
The affected versions of the Jenkins Mac Plugin are 1.1.0 and earlier.
There is no documented workaround for CVE-2020-2147; updating to a patched version is recommended.