Jenkins Email Extension Plugin Vulnerability Allows Unauthorized File Access
CVE-2023-32979
4.3MEDIUM
Summary
The Jenkins Email Extension Plugin has a vulnerability that allows attackers with Overall/Read permission to bypass permission checks during form validation. This weakness enables these attackers to locate files within the email-templates/ directory of the Jenkins home directory, potentially exposing sensitive information in the controller's file system.
Affected Version(s)
Jenkins Email Extension Plugin 2.96.1
Jenkins Email Extension Plugin 2.96.1
Jenkins Email Extension Plugin 2.89.0.2 < 2.89.0.*
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved