Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02ZnIzLTI4NnEtcTNjcs4AAl8W
Improper Validation of Certificate with Host Mismatch in Jenkins Mailer Plugin
Jenkins Mailer Plugin prior to 1.32.1, 1.31.1, and 1.29.1 does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.
Mailer Plugin 1.32.1, 1.31.1, and 1.29.1 validates the SMTP hostname when connecting via TLS by default. In Mailer Plugin 1.32 and earlier, administrators can set the Java system property mail.smtp.ssl.checkserveridentity to true on startup to enable this protection.
In case of problems, this protection can be disabled again by setting the Java system property mail.smtp.ssl.checkserveridentity to false on startup.
Permalink: https://github.com/advisories/GHSA-6fr3-286q-q3crJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02ZnIzLTI4NnEtcTNjcs4AAl8W
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 5 months ago
CVSS Score: 4.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-6fr3-286q-q3cr, CVE-2020-2252
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2252
- https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813
- http://www.openwall.com/lists/oss-security/2020/09/16/3
- https://github.com/CVEProject/cvelist/blob/16860a328d970faa6e4350b0fa446f64a52e52ca/2020/2xxx/CVE-2020-2252.json
- https://github.com/jenkinsci/mailer-plugin/commit/e1893c6d105669f134ee5c5212ef9f3944d7d00d
- https://github.com/advisories/GHSA-6fr3-286q-q3cr
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:mailer
Affected Version Ranges: < 1.29.1, >= 1.30, < 1.31.1, = 1.32Fixed in: 1.29.1, 1.31.1, 1.32.1