{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2091","assignerOrgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","assignerShortName":"jenkins","dateUpdated":"2024-08-04T06:54:00.589Z","dateReserved":"2019-12-05T00:00:00.000Z","datePublished":"2020-01-15T00:00:00.000Z"},"containers":{"cna":{"affected":[{"product":"Jenkins Amazon EC2 Plugin","vendor":"Jenkins project","versions":[{"lessThanOrEqual":"1.47","status":"affected","version":"unspecified","versionType":"custom"},{"lessThan":"unspecified","status":"unaffected","version":"1.46.2","versionType":"custom"},{"lessThan":"unspecified","status":"unaffected","version":"1.42.2","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method."}],"providerMetadata":{"orgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","shortName":"jenkins","dateUpdated":"2023-10-24T16:04:44.030Z"},"references":[{"url":"https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1004"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:54:00.589Z"},"title":"CVE Program Container","references":[{"url":"https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1004","tags":["x_transferred"]}]}]}}