Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-23T16:04:34.885Z
Reserved: 2023-05-16T10:55:43.518Z
Link: CVE-2023-32979

Updated: 2024-08-02T15:32:46.506Z

Status : Modified
Published: 2023-05-16T16:15:10.673
Modified: 2025-01-23T16:15:29.793
Link: CVE-2023-32979
