Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00cXJqLTk5cjYtamZyaM4AAl8M
Missing hostname validation in Email Extension Plugin
Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.
Email Extension Plugin 2.76 validates the SMTP hostname when connecting via TLS by default. In Email Extension Plugin 2.75 and earlier, administrators can set the Java system property mail.smtp.ssl.checkserveridentity
to true
on startup to enable this protection. Alternatively, this protection can be enabled (or disabled in the new version) via the 'Advanced Email Properties' field in the plugin’s configuration in Configure System.
In case of problems, this protection can be disabled again by setting mail.smtp.ssl.checkserveridentity
to false
using either method.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00cXJqLTk5cjYtamZyaM4AAl8M
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 12 months ago
CVSS Score: 4.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS Percentage: 0.0009
EPSS Percentile: 0.39519
Identifiers: GHSA-4qrj-99r6-jfrh, CVE-2020-2253
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2253
- https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1851
- http://www.openwall.com/lists/oss-security/2020/09/16/3
- https://github.com/jenkinsci/email-ext-plugin/commit/ac039ba581f5946975a327709ff201b459900caa
- https://github.com/advisories/GHSA-4qrj-99r6-jfrh
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:email-ext
Affected Version Ranges: <= 2.75Fixed in: 2.76