CVE-2020-2200: OS command injection vulnerability in Jenkins Play Framework Plugin
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.85219%
CWE
Published
5/24/2022
Updated
1/29/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:play-autotest-plugin | maven | <= 1.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a form validation
endpoint that executes the 'play' command using user-specified paths. Jenkins
plugin form validation
methods typically follow the doCheck[FieldName]
pattern in DescriptorImpl
classes. The exposure occurs when building OS commands with unvalidated user input (CWE-78). The descriptor method handling the 'play command path' field validation
would be responsible for constructing and executing validation
commands, making it the likely injection point. The high confidence comes from the direct match between the vulnerability description and common Jenkins
plugin implementation patterns for form validation
.