CVE-2020-2187Improper Certificate Validation in Project Jenkins Amazon EC2 Plugin

Severity
5.6MEDIUMNVD
EPSS
0.0%
top 88.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 6
Latest updateMay 24

Description

Jenkins Amazon EC2 Plugin 1.50.1 and earlier unconditionally accepts self-signed certificates and does not perform hostname validation, enabling man-in-the-middle attacks.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 2.2 | Impact: 3.4

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_amazon_ec2_pluginunspecified1.50.1
NVDjenkins/amazon_ec21.50.1

🔴Vulnerability Details

3
GHSA
Lack of SSL/TLS certificate and hostname validation in Amazon EC2 Plugin2022-05-24
OSV
Lack of SSL/TLS certificate and hostname validation in Amazon EC2 Plugin2022-05-24
CVEList
CVE-2020-2187: Jenkins Amazon EC2 Plugin 12020-05-06

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2020-05-062020-05-06
CVE-2020-2187 — Improper Certificate Validation | cvebase