Lucene search

K
cvelistJenkinsCVELIST:CVE-2023-32979
HistoryMay 16, 2023 - 4:00 p.m.

CVE-2023-32979

2023-05-1616:00:00
jenkins
www.cve.org
2
jenkins
email extension
overall/read
permission check
file existence
directory

5.1 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.3%

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Jenkins Email Extension Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThan": "*",
        "status": "unaffected",
        "version": "2.96.1",
        "versionType": "maven"
      },
      {
        "lessThan": "2.89.0.*",
        "status": "unaffected",
        "version": "2.89.0.2",
        "versionType": "maven"
      }
    ]
  }
]

5.1 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.3%