Skip to content

Arbitrary shell command execution in Jenkins EC2 Plugin

High severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Jan 30, 2024

Package

maven org.jenkins-ci.plugins:ec2 (Maven)

Affected versions

<= 1.37

Patched versions

1.38

Description

Users with permission to create or configure agents in Jenkins 1.37 and earlier could configure an EC2 agent to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of these agents now requires the 'Run Scripts' permission typically only granted to administrators.

References

Published by the National Vulnerability Database Jan 24, 2018
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jan 30, 2024
Last updated Jan 30, 2024

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2017-1000502

GHSA ID

GHSA-wp79-cpv2-9g7m

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.