CVE-2020-2200

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-2200
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2200.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-2200
Aliases
Published
2020-06-03T13:15:11Z
Modified
2024-09-03T03:21:40.500972Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jenkins Play Framework Plugin 1.0.2 and earlier lets users specify the path to the play command on the Jenkins master for a form validation endpoint, resulting in an OS command injection vulnerability exploitable by users able to store such a file on the Jenkins master.

References

Affected packages

Git / github.com/jenkinsci/play-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/play-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

play-autotest-plugin-0.*

play-autotest-plugin-0.0.1
play-autotest-plugin-0.0.10
play-autotest-plugin-0.0.11
play-autotest-plugin-0.0.12
play-autotest-plugin-0.0.2
play-autotest-plugin-0.0.3
play-autotest-plugin-0.0.4
play-autotest-plugin-0.0.5
play-autotest-plugin-0.0.6
play-autotest-plugin-0.0.7
play-autotest-plugin-0.0.8
play-autotest-plugin-0.0.9

play-autotest-plugin-1.*

play-autotest-plugin-1.0.0
play-autotest-plugin-1.0.1
play-autotest-plugin-1.0.2