Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1jOHFyLXZmamYtNjJxM84AARb5

Emails were sent to addresses not associated with actual users of Jenkins by Email Extension Plugin

jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.

Permalink: https://github.com/advisories/GHSA-c8qr-vfjf-62q3
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jOHFyLXZmamYtNjJxM84AARb5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 3 months ago


CVSS Score: 5.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-c8qr-vfjf-62q3, CVE-2017-2654
References: Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:email-ext
Affected Version Ranges: < 2.57.1
Fixed in: 2.57.1