logo

CVE-2020-2252 org.jenkins-ci.plugins:mailer

Package

Manager: maven
Name: org.jenkins-ci.plugins:mailer
Vulnerable Version: =1.32 || >=1.32 <1.32.1 || >=1.30 <1.31.1 || >=0 <1.29.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00036 pctl0.08864

Details

Improper Validation of Certificate with Host Mismatch in Jenkins Mailer Plugin Jenkins Mailer Plugin prior to 1.32.1, 1.31.1, and 1.29.1 does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections. Mailer Plugin 1.32.1, 1.31.1, and 1.29.1 validates the SMTP hostname when connecting via TLS by default. In Mailer Plugin 1.32 and earlier, administrators can set the Java system property mail.smtp.ssl.checkserveridentity to true on startup to enable this protection. In case of problems, this protection can be disabled again by setting the Java system property mail.smtp.ssl.checkserveridentity to false on startup.

Metadata

Created: 2022-05-24T17:28:25Z
Modified: 2023-05-23T20:56:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6fr3-286q-q3cr/GHSA-6fr3-286q-q3cr.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-6fr3-286q-q3cr
Finding: F163
Auto approve: 1