First published: Fri Mar 08 2019(Updated: )
A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src/main/java/hudson/plugins/emailext/plugins/trigger/AbstractScriptTrigger.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Email Extension | <=2.64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1003032 is critical with a CVSS score of 9.9.
The affected software of CVE-2019-1003032 is Jenkins Email Extension Plugin version 2.64 and earlier.
To fix the vulnerability in CVE-2019-1003032, update Jenkins Email Extension Plugin to version 2.65 or later.
You can find more information about CVE-2019-1003032 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/107476) and [Jenkins Security Advisory](https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1340).