logo

CVE-2020-2185 org.jenkins-ci.plugins:ec2

Package

Manager: maven
Name: org.jenkins-ci.plugins:ec2
Vulnerable Version: >=0 <1.50.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.001 pctl0.2837

Details

Missing SSH host key validation in Jenkins Amazon EC2 Plugin Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not use SSH host key validation when connecting to agents. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections to build agents. Jenkins Amazon EC2 Plugin 1.50.2 provides strategies for performing host key validation for administrators to select the one that meets their security needs. It includes assistance for administrators to migrate to a new, more secure strategy. For more information see [the plugin documentation](https://github.com/jenkinsci/ec2-plugin/#securing-the-connection-to-unix-amis).

Metadata

Created: 2022-05-24T17:17:14Z
Modified: 2023-12-14T09:28:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q8qq-2p5p-rg44/GHSA-q8qq-2p5p-rg44.json
CWE IDs: ["CWE-300"]
Alternative ID: GHSA-q8qq-2p5p-rg44
Finding: F332
Auto approve: 1