#VU26396 Input validation error in Pipeline: AWS Steps - CVE-2020-2166

 

#VU26396 Input validation error in Pipeline: AWS Steps - CVE-2020-2166

Published: March 26, 2020


Vulnerability identifier: #VU26396
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-2166
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Pipeline: AWS Steps
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the affected software does not configure its YAML parser to prevent the instantiation of arbitrary types. A remote authenticated attacker able to provide YAML input files can execute arbitrary code on the target system.


Remediation

Install updates from vendor's website.

External links