VYPR
Moderate severityNVD Advisory· Published Aug 6, 2018· Updated Aug 5, 2024

CVE-2017-2654

CVE-2017-2654

Description

jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins Email Extension Plugin before 2.57.1 sends emails to dynamically created user lists, potentially exposing information to unintended recipients not associated with Jenkins.

Vulnerability

The Email Extension Plugin (jenkins-email-ext) before version 2.57.1 contains an information exposure vulnerability. The plugin can send emails to a dynamically created list of users based on changelogs, such as authors of SCM changes since the last successful build. Due to a mapping based on the local-part of email addresses, emails may be sent to individuals who have no user account in Jenkins or, in rare cases, to people not involved in the project. [1][2][3]

Exploitation

No direct attacker interaction is required; the vulnerability is triggered during normal Jenkins operation when a build triggers email notifications to changelog authors. An attacker does not need special authentication or network position beyond typical job configuration access. The issue arises from the plugin's email address resolution logic, which may incorrectly map local-parts to unintended recipients. [2]

Impact

The impact is information exposure: unintended recipients receive emails containing build details, potentially revealing sensitive project information, commit messages, or internal communications. This violates confidentiality and could lead to unintended disclosure of project activities. There is no direct privilege escalation, but information is leaked to unauthorized parties. [1][2]

Mitigation

The fix was released in version 2.57.1 of the Email Extension Plugin, published on 2017-03-20 as per the Jenkins security advisory. Users should upgrade to version 2.57.1 or later. No workaround is documented. [2]

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:email-extMaven
< 2.57.12.57.1

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.