First published: Mon Mar 09 2020(Updated: )
Jenkins Literate Plugin 1.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Literate | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2158 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2020-2158, you should upgrade to Jenkins Literate Plugin version 1.1 or later.
CVE-2020-2158 is caused by the YAML parser in the Jenkins Literate Plugin not being configured properly, allowing the instantiation of arbitrary types.
Yes, CVE-2020-2158 is exploitable remotely, which can lead to unauthorized execution of code on affected systems.
CVE-2020-2158 affects the Jenkins Literate Plugin version 1.0 and earlier.