OS Command Injection in CryptoMove - CVE-2020-2159

 

OS Command Injection in CryptoMove - CVE-2020-2159

Published: March 12, 2020


Vulnerability identifier: #VU26045
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-2159
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Jenkins
Affected software:
CryptoMove

Detailed vulnerability description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to the affected plugin allows the configuration of an OS command to execute as part of its build step configuration. A remote user with Job/Configure permission can execute an arbitrary OS command on the Jenkins master.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


How to mitigate CVE-2020-2159

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources