Lucene search

K
cve[email protected]CVE-2023-32979
HistoryMay 16, 2023 - 4:15 p.m.

CVE-2023-32979

2023-05-1616:15:10
CWE-732
web.nvd.nist.gov
28
jenkins
email extension plugin
cve-2023-32979
security vulnerability
permission check

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.3 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.5%

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

Affected configurations

NVD
Node
jenkinsemail_extensionRange2.96jenkins

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Jenkins Email Extension Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThan": "*",
        "status": "unaffected",
        "version": "2.96.1",
        "versionType": "maven"
      },
      {
        "lessThan": "2.89.0.*",
        "status": "unaffected",
        "version": "2.89.0.2",
        "versionType": "maven"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.3 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.5%