logo

CVE-2023-25765 org.jenkins-ci.plugins:email-ext

Package

Manager: maven
Name: org.jenkins-ci.plugins:email-ext
Vulnerable Version: >=0 <2.94

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00033 pctl0.07929

Details

Sandbox escape in Jenkins Email Extension Plugin In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Metadata

Created: 2023-02-15T15:30:40Z
Modified: 2023-02-23T21:31:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-c9c2-wcxh-3w5j/GHSA-c9c2-wcxh-3w5j.json
CWE IDs: ["CWE-693"]
Alternative ID: GHSA-c9c2-wcxh-3w5j
Finding: F115
Auto approve: 1