Jenkins.Amazon.EC2.Plugin.CSRF

description-logoDescription

This indicates an attack attempt to exploit a Cross-Site Request Forgery Vulnerability in Jenkins Amazon EC2 Plugin.
The vulnerability is due to a lack of CSRF protection mechanism on certain endpoints handled by the plugin. A remote attacker can exploit these vulnerabilities by enticing a target user into clicking a malicious link or visiting a crafted web page. Successful exploitation results in the target user taking actions on behalf of the attacker which, in the worst case, results in the provisioning of Amazon EC2 instances with an attacker specified template name.

affected-products-logoAffected Products

Jenkins Amazon EC2 Plugin 1.50.1 and earlier

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.jenkins.io/security/advisory/2020-05-06/#SECURITY-1408

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-10-01 16.936 Default_action:pass:drop
2020-09-22 16.930