First published: Mon Mar 09 2020(Updated: )
Jenkins CryptoMove Plugin 0.1.33 and earlier allows attackers with Job/Configure access to execute arbitrary OS commands on the Jenkins master as the OS user account running Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cryptomove | <=0.1.33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2159 is classified as a critical vulnerability due to the potential for arbitrary OS command execution.
To fix CVE-2020-2159, upgrade to Jenkins CryptoMove Plugin version 0.1.34 or later.
Any Jenkins instance with CryptoMove Plugin versions 0.1.33 and earlier that allows Job/Configure access is affected.
The implications of CVE-2020-2159 include the risk of attackers executing arbitrary commands with the privileges of the Jenkins master.
The recommended workaround for CVE-2020-2159 is to restrict Job/Configure access until the plugin is updated.