CVE-2020-2252 – org.jenkins-ci.plugins:mailer
Package
Manager: maven
Name: org.jenkins-ci.plugins:mailer
Vulnerable Version: =1.32 || >=1.32 <1.32.1 || >=1.30 <1.31.1 || >=0 <1.29.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00036 pctl0.08864
Details
Improper Validation of Certificate with Host Mismatch in Jenkins Mailer Plugin Jenkins Mailer Plugin prior to 1.32.1, 1.31.1, and 1.29.1 does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections. Mailer Plugin 1.32.1, 1.31.1, and 1.29.1 validates the SMTP hostname when connecting via TLS by default. In Mailer Plugin 1.32 and earlier, administrators can set the Java system property mail.smtp.ssl.checkserveridentity to true on startup to enable this protection. In case of problems, this protection can be disabled again by setting the Java system property mail.smtp.ssl.checkserveridentity to false on startup.
Metadata
Created: 2022-05-24T17:28:25Z
Modified: 2023-05-23T20:56:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6fr3-286q-q3cr/GHSA-6fr3-286q-q3cr.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-6fr3-286q-q3cr
Finding: F163
Auto approve: 1