First published: Wed Jun 03 2020(Updated: )
A cross-site request forgery vulnerability in Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier allows attackers to add or remove agent labels.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Self-organizing Swarm Modules | <=3.20 | |
maven/org.jenkins-ci.plugins:swarm | <3.21 | 3.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2192 is classified as a medium severity cross-site request forgery vulnerability.
To fix CVE-2020-2192, upgrade the Jenkins Self-Organizing Swarm Plug-in Modules Plugin to version 3.21 or later.
CVE-2020-2192 allows an attacker to add or remove agent labels without proper authentication.
Versions 3.20 and earlier of the Jenkins Self-Organizing Swarm Plug-in Modules are affected by CVE-2020-2192.
You can check if you are vulnerable to CVE-2020-2192 by verifying if you are using Jenkins Self-Organizing Swarm Plug-in Modules plugin version 3.20 or earlier.