Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1jOWMyLXdjeGgtM3c1as4AAxpZ

Sandbox escape in Jenkins Email Extension Plugin

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Permalink: https://github.com/advisories/GHSA-c9c2-wcxh-3w5j
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jOWMyLXdjeGgtM3c1as4AAxpZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 2 years ago
Updated: 11 months ago


CVSS Score: 10.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Identifiers: GHSA-c9c2-wcxh-3w5j, CVE-2023-25765
References: Repository: https://github.com/jenkinsci/email-ext-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:email-ext
Affected Version Ranges: <= 2.93
Fixed in: 2.94