Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS05djcyLXA1cDMtOXc2Nc4AARb4
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins-mailer-plugin
jenkins-mailer-plugin before version 1.20 is vulnerable to an information disclosure while using the feature to send emails to a dynamically created list of users based on the changelogs. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.
Permalink: https://github.com/advisories/GHSA-9v72-p5p3-9w65JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05djcyLXA1cDMtOXc2Nc4AARb4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
CVSS Score: 3.7
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-9v72-p5p3-9w65, CVE-2017-2651
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-2651
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2651
- https://jenkins.io/security/advisory/2017-03-20/
- http://www.securityfocus.com/bid/96984
- https://github.com/advisories/GHSA-9v72-p5p3-9w65
Affected Packages
maven:org.jenkins-ci.plugins:mailer
Affected Version Ranges: <= 1.19Fixed in: 1.20