First published: Thu Jul 02 2020(Updated: )
A missing permission check in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified username and password.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Zephyr For Jira Test Management | <=1.5 | |
maven/org.jenkins-ci.plugins:zephyr-for-jira-test-management | <=1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2216 is rated as a medium severity vulnerability due to the potential for unauthorized access.
To fix CVE-2020-2216, update the Jenkins Zephyr for JIRA Test Management Plugin to version 1.6 or later.
CVE-2020-2216 affects users of Jenkins Zephyr for JIRA Test Management Plugin version 1.5 and earlier.
Yes, CVE-2020-2216 can be exploited remotely if an attacker has the Overall/Read permission.
CVE-2020-2216 allows an attacker to connect to a malicious HTTP server using provided credentials.