Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jOHFyLXZmamYtNjJxM84AARb5
Emails were sent to addresses not associated with actual users of Jenkins by Email Extension Plugin
jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.
Permalink: https://github.com/advisories/GHSA-c8qr-vfjf-62q3JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jOHFyLXZmamYtNjJxM84AARb5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 3 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-c8qr-vfjf-62q3, CVE-2017-2654
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-2654
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2654
- https://jenkins.io/security/advisory/2017-03-20/
- https://github.com/advisories/GHSA-c8qr-vfjf-62q3
Affected Packages
maven:org.jenkins-ci.plugins:email-ext
Affected Version Ranges: < 2.57.1Fixed in: 2.57.1