CVE-2023-32979

Severity
4.3MEDIUM
EPSS
0.1%
top 82.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 16

Description

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

🔴Vulnerability Details

3
CVEList
CVE-2023-32979: Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read perm2023-05-16
OSV
Jenkins Email Extension Plugin missing permission check2023-05-16
GHSA
Jenkins Email Extension Plugin missing permission check2023-05-16

📋Vendor Advisories

2
Red Hat
jenkins-2-plugin: email-ext: Missing permission check in Email Extension Plugin2023-05-16
Jenkins
Jenkins Security Advisory 2023-05-162023-05-16
CVE-2023-32979 (MEDIUM CVSS 4.3) | Jenkins Email Extension Plugin does | cvebase.io