First published: Wed May 06 2020(Updated: )
Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not use SSH host key validation when connecting to agents. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections to build agents. Jenkins Amazon EC2 Plugin 1.50.2 provides strategies for performing host key validation for administrators to select the one that meets their security needs. It includes assistance for administrators to migrate to a new, more secure strategy. For more information see [the plugin documentation](https://github.com/jenkinsci/ec2-plugin/#securing-the-connection-to-unix-amis).
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Amazon Ec2 | <=1.50.1 | |
maven/org.jenkins-ci.plugins:ec2 | <=1.50.1 | 1.50.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins Amazon EC2 Plugin vulnerability is CVE-2020-2185.
CVE-2020-2185 has a severity rating of 5.6, which is considered medium.
CVE-2020-2185 is a vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier that allows man-in-the-middle attacks due to lack of SSH host key validation.
Jenkins Amazon EC2 Plugin versions up to and including 1.50.1 are affected by CVE-2020-2185.
To fix the CVE-2020-2185 vulnerability, update Jenkins Amazon EC2 Plugin to a version higher than 1.50.1 that includes the fix.