Command Injection Affecting io.jenkins.plugins:cryptomove package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.51% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-IOJENKINSPLUGINS-3226607
  • published6 Jan 2023
  • disclosed24 May 2022
  • creditWasin Saengow

Introduced: 24 May 2022

CVE-2020-2159  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

There is no fixed version for io.jenkins.plugins:cryptomove.

Overview

io.jenkins.plugins:cryptomove is a Jenkins plugin that sources your keys and secrets stored on CryptoMove and runs a command with your keys and secrets available as environment variables with the name and value.

Affected versions of this package are vulnerable to Command Injection such that it allows the configuration of an OS command to execute as part of its build step configuration. This command will be executed on the Jenkins controller as the OS user account running Jenkins, allowing user with Job/Configure permission to execute an arbitrary OS command on the Jenkins controller.

CVSS Scores

version 3.1