Lucene search

K

5 matches found

CVE
CVE
added 2023/02/15 2:15 p.m.84 views

CVE-2023-25765

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM...

9.9CVSS9.6AI score0.00033EPSS
CVE
CVE
added 2023/02/15 2:15 p.m.75 views

CVE-2023-25763

Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.

5.4CVSS5.2AI score0.04677EPSS
CVE
CVE
added 2023/05/16 4:15 p.m.69 views

CVE-2023-32980

A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job.

4.3CVSS4.4AI score0.00183EPSS
CVE
CVE
added 2023/05/16 4:15 p.m.62 views

CVE-2023-32979

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

4.3CVSS4.3AI score0.00098EPSS
CVE
CVE
added 2023/02/15 2:15 p.m.60 views

CVE-2023-25764

Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templ...

5.4CVSS5.3AI score0.04677EPSS