CVE-2020-2200
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2020-2200. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
Jenkins Play Framework Plugin 1.0.2 and earlier lets users specify the path to the `play` command on the Jenkins master for a form validation endpoint, resulting in an OS command injection vulnerability exploitable by users able to store such a file on the Jenkins master.
Available Exploits
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
OS command injection vulnerability in Jenkins Play Framework Plugin
GHSA-h5mv-fv98-gqmqAdvisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References
Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: December 21, 2022