CVE-2023-25765 – org.jenkins-ci.plugins:email-ext
Package
Manager: maven
Name: org.jenkins-ci.plugins:email-ext
Vulnerable Version: >=0 <2.94
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00033 pctl0.07929
Details
Sandbox escape in Jenkins Email Extension Plugin In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Metadata
Created: 2023-02-15T15:30:40Z
Modified: 2023-02-23T21:31:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-c9c2-wcxh-3w5j/GHSA-c9c2-wcxh-3w5j.json
CWE IDs: ["CWE-693"]
Alternative ID: GHSA-c9c2-wcxh-3w5j
Finding: F115
Auto approve: 1