logo

CVE-2020-2261 io.jenkins.plugins:perfecto

Package

Manager: maven
Name: io.jenkins.plugins:perfecto
Vulnerable Version: >=0 <1.18

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00246 pctl0.47776

Details

OS command execution vulnerability in Perfecto Plugin Perfecto Plugin allows specifying Perfecto Connect Path and Perfecto Connect File Name in job configurations. This command is executed on the Jenkins controller in Perfecto Plugin 1.17 and earlier, allowing attackers with Job/Configure permission to run arbitrary commands on the Jenkins controller. Perfecto Plugin 1.18 executes the specified commands on the agent the build is running on.

Metadata

Created: 2022-05-24T17:28:26Z
Modified: 2022-12-29T01:42:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-jq84-6fmm-6qv6/GHSA-jq84-6fmm-6qv6.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-jq84-6fmm-6qv6
Finding: F404
Auto approve: 1