jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2654 | Issue Tracking Third Party Advisory |
https://jenkins.io/security/advisory/2017-03-20/ | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2654 | Issue Tracking Third Party Advisory |
https://jenkins.io/security/advisory/2017-03-20/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 3.7 |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2654 - Issue Tracking, Third Party Advisory | |
References | () https://jenkins.io/security/advisory/2017-03-20/ - Vendor Advisory |
Information
Published : 2018-08-06 22:29
Updated : 2024-11-21 03:23
NVD link : CVE-2017-2654
Mitre link : CVE-2017-2654
CVE.ORG link : CVE-2017-2654
JSON object : View
Products Affected
jenkins
- email_extension
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor