Unauthenticated Remote Code Execution in Jenkins Amazon EC2 Plugin

Unauthenticated Remote Code Execution in Jenkins Amazon EC2 Plugin

CVE-2020-2091 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.

Learn more about our Aws Audit.