CVE-2020-2091

Severity
8.1HIGH
EPSS
0.0%
top 85.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Latest updateMay 24

Description

A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2

Affected Packages3 packages

🔴Vulnerability Details

3
GHSA
Missing permission checks in Jenkins Amazon EC2 Plugin2022-05-24
OSV
Missing permission checks in Jenkins Amazon EC2 Plugin2022-05-24
CVEList
CVE-2020-2091: A missing permission check in Jenkins Amazon EC2 Plugin 12020-01-15

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2020-01-152020-01-15
CVE-2020-2091 (HIGH CVSS 8.1) | A missing permission check in Jenki | cvebase.io