First published: Mon Aug 06 2018(Updated: )
jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Email Extension | <2.57.1 | |
maven/org.jenkins-ci.plugins:email-ext | <2.57.1 | 2.57.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2654 is classified as a moderate-severity vulnerability due to potential information exposure.
To fix CVE-2017-2654, upgrade the Jenkins Email Extension plugin to version 2.57.1 or later.
CVE-2017-2654 may expose user information by sending emails to a dynamically created list that includes authors of SCM changes.
CVE-2017-2654 affects all versions of the Jenkins Email Extension plugin prior to 2.57.1.
If you have updated to the Jenkins Email Extension plugin version 2.57.1 or later, CVE-2017-2654 is no longer a risk.