First published: Wed Feb 15 2023(Updated: )
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Email Extension | <2.93.1 | |
<2.93.1 | ||
Jenkins Email Extension | <=2.93 | |
maven/org.jenkins-ci.plugins:email-ext | <=2.93 | 2.94 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-25765.
The severity of CVE-2023-25765 is critical with a CVSS score of 9.9.
The affected software is Jenkins Email Extension Plugin versions 2.93 and earlier.
An attacker can bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
To fix CVE-2023-25765, update Jenkins Email Extension Plugin to version 2.93.1 or later.