First published: Wed Sep 16 2020(Updated: )
Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkins process is running as.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Selection Tasks | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2276 is a vulnerability in Jenkins Selection tasks Plugin 1.0 and earlier that allows attackers to execute arbitrary system commands on the Jenkins controller.
CVE-2020-2276 is considered critical with a severity score of 8.8.
Jenkins Selection tasks Plugin 1.0 and earlier are affected by CVE-2020-2276.
An attacker with Job/Configure permission can exploit CVE-2020-2276 by executing a user-specified program on the Jenkins controller.
Yes, you can find more information about CVE-2020-2276 at the following links: [here](http://www.openwall.com/lists/oss-security/2020/09/16/3) and [here](https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1967).