
Cloud Vulnerability DB
A community-led vulnerabilities database
Jenkins CryptoMove Plugin version 0.1.33 and earlier contains a critical OS command injection vulnerability identified as CVE-2020-2159. The vulnerability was discovered by Wasin Saengow and publicly disclosed on March 9, 2020. This security flaw affects the Jenkins CryptoMove Plugin, which is a Jenkins automation server component (Jenkins Advisory, OSS Security).
The vulnerability allows attackers with Job/Configure permission to execute arbitrary OS commands on the Jenkins master node. The commands are executed with the same privileges as the OS user account running Jenkins. The vulnerability has been assigned a severity rating of High according to the CVSS scoring system. The issue stems from the plugin's build step configuration which permits the configuration of OS commands without proper validation or sanitization (Jenkins Advisory).
The vulnerability enables attackers with Job/Configure permissions to execute arbitrary operating system commands on the Jenkins master node with the same privileges as the Jenkins service account. This could potentially lead to complete system compromise, data theft, service disruption, or use of the Jenkins server for further attacks (NVD).
As of the advisory publication date, no official fix has been released for this vulnerability. Organizations using the CryptoMove Plugin version 0.1.33 or earlier should consider disabling the plugin or restricting Job/Configure permissions to trusted users only until a patch becomes available (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."