Lucene search

K

Email Extension Security Vulnerabilities

cve
cve

CVE-2023-32980

A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified...

4.3CVSS

4.4AI Score

0.0005EPSS

2023-05-16 04:15 PM
32
cve
cve

CVE-2023-32979

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file...

4.3CVSS

4.3AI Score

0.0005EPSS

2023-05-16 04:15 PM
28
cve
cve

CVE-2023-25763

Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected...

5.4CVSS

5.2AI Score

0.001EPSS

2023-02-15 02:15 PM
33
cve
cve

CVE-2023-25765

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller...

9.9CVSS

9.6AI Score

0.001EPSS

2023-02-15 02:15 PM
42
cve
cve

CVE-2023-25764

Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email...

5.4CVSS

5.3AI Score

0.001EPSS

2023-02-15 02:15 PM
33
cve
cve

CVE-2018-1000176

An exposure of sensitive information vulnerability exists in Jenkins Email Extension Plugin 2.61 and older in src/main/resources/hudson/plugins/emailext/ExtendedEmailPublisher/global.groovy and ExtendedEmailPublisherDescriptor.java that allows attackers with control of a Jenkins administrator's...

6.5CVSS

6.2AI Score

0.001EPSS

2022-10-03 04:21 PM
19
cve
cve

CVE-2021-44228

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message....

10CVSS

9.8AI Score

0.976EPSS

2021-12-10 10:15 AM
3635
In Wild
399
cve
cve

CVE-2020-2253

Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP...

4.8CVSS

5AI Score

0.001EPSS

2020-09-16 02:15 PM
40
cve
cve

CVE-2020-2232

Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its...

7.5CVSS

7.6AI Score

0.002EPSS

2020-08-12 02:15 PM
35
cve
cve

CVE-2019-1003032

A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java,...

9.9CVSS

9.7AI Score

0.001EPSS

2019-03-08 09:29 PM
48
cve
cve

CVE-2018-1000417

A cross-site request forgery vulnerability exists in Jenkins Email Extension Template Plugin 1.0 and earlier in ExtEmailTemplateManagement.java that allows creating or removing...

8.1CVSS

8AI Score

0.001EPSS

2019-01-09 11:29 PM
22
cve
cve

CVE-2017-2654

jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in...

5.3CVSS

5.1AI Score

0.001EPSS

2018-08-06 10:29 PM
27
cve
cve

CVE-2016-8005

File extension filtering vulnerability in Intel Security McAfee Email Gateway (MEG) before 7.6.404h1128596 allows attackers to fail to identify the file name properly via scanning an email with a forged attached filename that uses a null byte within the filename...

6.5CVSS

6.3AI Score

0.001EPSS

2017-03-14 10:59 PM
17