First published: Wed Jan 12 2022(Updated: )
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:mailer | <1.34.2 | 1.34.2 |
maven/org.jenkins-ci.plugins:mailer | >=391.ve4a38c1bcf4b<408.vd726a | 408.vd726a |
Jenkins Mailer Jenkins | <1.34.2 | |
Jenkins Mailer | =391.ve4a_38c1b_cf4b_ | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins Mailer Plugin vulnerability is CVE-2022-20614.
CVE-2022-20614 has a severity rating of medium (4.3).
The Jenkins Mailer Plugin vulnerability (CVE-2022-20614) allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
Jenkins Mailer Plugin versions 391.ve4a_38c1b_cf4b_ and earlier, as well as version 1.34.2, are affected by CVE-2022-20614.
To fix the Jenkins Mailer Plugin vulnerability (CVE-2022-20614), upgrade to version 408.vd726a_1130320 or later.