Lucene search

K

Amazon Ec2 Security Vulnerabilities

cve
cve

CVE-2020-2090

A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.

8.8CVSS

8.6AI Score

0.001EPSS

2020-01-15 04:15 PM
42
cve
cve

CVE-2020-2091

A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.

8.1CVSS

7.9AI Score

0.001EPSS

2020-01-15 04:15 PM
41
5
cve
cve

CVE-2020-2185

Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not validate SSH host keys when connecting agents, enabling man-in-the-middle attacks.

5.6CVSS

5.5AI Score

0.001EPSS

2020-05-06 01:15 PM
39
cve
cve

CVE-2020-2186

A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier allows attackers to provision instances.

4.3CVSS

4.5AI Score

0.001EPSS

2020-05-06 01:15 PM
36
cve
cve

CVE-2020-2187

Jenkins Amazon EC2 Plugin 1.50.1 and earlier unconditionally accepts self-signed certificates and does not perform hostname validation, enabling man-in-the-middle attacks.

5.6CVSS

5.5AI Score

0.001EPSS

2020-05-06 01:15 PM
37
cve
cve

CVE-2020-2188

A missing permission check in Jenkins Amazon EC2 Plugin 1.50.1 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

4.3CVSS

4.4AI Score

0.001EPSS

2020-05-06 01:15 PM
34