NA

CVE-2023-32979

Published: 16/05/2023 Updated: 25/05/2023
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins email extension

Vendor Advisories

Synopsis Important: OpenShift Container Platform 41062 security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic Red Hat OpenShift Container Platform release 41062 is now available with updates to packages and i ...
DescriptionThe MITRE CVE dictionary describes this issue as: Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system ...