High severityNVD Advisory· Published Mar 25, 2020· Updated Aug 4, 2024
CVE-2020-2168
CVE-2020-2168
Description
Jenkins Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:azure-acsMaven | < 1.0.2 | 1.0.2 |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-5qff-7944-vq4fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-2168ghsaADVISORY
- www.openwall.com/lists/oss-security/2020/03/25/2ghsamailing-listx_refsource_MLISTWEB
- jenkins.io/security/advisory/2020-03-25/ghsax_refsource_CONFIRMWEB
News mentions
1- Jenkins Security Advisory 2020-03-25Jenkins Security Advisories · Mar 25, 2020