First published: Wed May 06 2020(Updated: )
Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not validate SSH host keys when connecting agents, enabling man-in-the-middle attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Amazon Ec2 | <=1.50.1 | |
maven/org.jenkins-ci.plugins:ec2 | <=1.50.1 | 1.50.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins Amazon EC2 Plugin vulnerability is CVE-2020-2185.
CVE-2020-2185 has a severity rating of 5.6, which is considered medium.
CVE-2020-2185 is a vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier that allows man-in-the-middle attacks due to lack of SSH host key validation.
Jenkins Amazon EC2 Plugin versions up to and including 1.50.1 are affected by CVE-2020-2185.
To fix the CVE-2020-2185 vulnerability, update Jenkins Amazon EC2 Plugin to a version higher than 1.50.1 that includes the fix.