First published: Tue May 16 2023(Updated: )
Jenkins Email Extension Plugin 2.96 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to check for the existence of files in the `email-templates/` directory in the Jenkins home directory on the controller file system. This form validation method requires the appropriate permission in Email Extension Plugin 2.96.1.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Email Extension Plugin | <2.96.1 | 2.96.1 |
Jenkins Email Extension | <=2.96 | |
maven/org.jenkins-ci.plugins:email-ext | <2.96.1 | 2.96.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32979 is medium (4).
The affected software is Jenkins Email Extension Plugin version up to 2.96.1.
An attacker with Overall/Read permission can exploit CVE-2023-32979 to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.
Yes, the fix for CVE-2023-32979 is to upgrade to Jenkins Email Extension Plugin version 2.96.1.
You can find more information about CVE-2023-32979 at the following links: [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(1)) and [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2023:3625).