Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00cXJqLTk5cjYtamZyaM4AAl8M

Missing hostname validation in Email Extension Plugin

Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.

Email Extension Plugin 2.76 validates the SMTP hostname when connecting via TLS by default. In Email Extension Plugin 2.75 and earlier, administrators can set the Java system property mail.smtp.ssl.checkserveridentity to true on startup to enable this protection. Alternatively, this protection can be enabled (or disabled in the new version) via the 'Advanced Email Properties' field in the plugin’s configuration in Configure System.

In case of problems, this protection can be disabled again by setting mail.smtp.ssl.checkserveridentity to false using either method.

Permalink: https://github.com/advisories/GHSA-4qrj-99r6-jfrh
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00cXJqLTk5cjYtamZyaM4AAl8M
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 12 months ago


CVSS Score: 4.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS Percentage: 0.0009
EPSS Percentile: 0.39519

Identifiers: GHSA-4qrj-99r6-jfrh, CVE-2020-2253
References: Repository: https://github.com/jenkinsci/email-ext-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:email-ext
Affected Version Ranges: <= 2.75
Fixed in: 2.76