Jenkins.Amazon.EC2.Plugin.CSRF
Description
This indicates an attack attempt to exploit a Cross-Site Request Forgery Vulnerability in Jenkins Amazon EC2 Plugin.
The vulnerability is due to a lack of CSRF protection mechanism on certain endpoints handled by the plugin. A remote attacker can exploit these vulnerabilities by enticing a target user into clicking a malicious link or visiting a crafted web page. Successful exploitation results in the target user taking actions on behalf of the attacker which, in the worst case, results in the provisioning of Amazon EC2 instances with an attacker specified template name.
Affected Products
Jenkins Amazon EC2 Plugin 1.50.1 and earlier
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.jenkins.io/security/advisory/2020-05-06/#SECURITY-1408
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |