CVE-2023-25765

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*

History

03 Nov 2023, 02:00

Type Values Removed Values Added
CWE NVD-CWE-noinfo

25 Oct 2023, 18:17

Type Values Removed Values Added
CWE CWE-693

23 Feb 2023, 04:47

Type Values Removed Values Added
First Time Jenkins email Extension
Jenkins
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.9
CPE cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*
References (MLIST) http://www.openwall.com/lists/oss-security/2023/02/15/4 - (MLIST) http://www.openwall.com/lists/oss-security/2023/02/15/4 - Mailing List, Third Party Advisory
References (CONFIRM) https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939 - (CONFIRM) https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939 - Vendor Advisory

15 Feb 2023, 16:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/02/15/4 -

15 Feb 2023, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-15 14:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-25765

Mitre link : CVE-2023-25765

CVE.ORG link : CVE-2023-25765


JSON object : View

Products Affected

jenkins

  • email_extension