VYPR

Maven package

org.jenkins-ci.plugins/email-ext

pkg:maven/org.jenkins-ci.plugins/email-ext

Vulnerabilities (11)

  • CVE-2023-32980May 16, 2023
    affected < 2.96.1fixed 2.96.1

    A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job.

  • CVE-2023-32979May 16, 2023
    affected < 2.96.1fixed 2.96.1

    Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file

  • CVE-2023-25765Feb 15, 2023
    affected < 2.94fixed 2.94

    In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jen

  • CVE-2023-25764Feb 15, 2023
    affected < 2.94fixed 2.94

    Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change

  • CVE-2023-25763Feb 15, 2023
    affected < 2.94fixed 2.94

    Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.

  • CVE-2020-2253Sep 16, 2020
    affected < 2.76fixed 2.76

    Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server.

  • CVE-2020-2232Aug 12, 2020
    affected >= 2.72, < 2.74fixed 2.74

    Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.

  • CVE-2019-1003032Mar 8, 2019
    affected < 2.65fixed 2.65

    A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext

  • CVE-2018-1000417Jan 9, 2019
    affected < 1.1fixed 1.1

    A cross-site request forgery vulnerability exists in Jenkins Email Extension Template Plugin 1.0 and earlier in ExtEmailTemplateManagement.java that allows creating or removing templates.

  • CVE-2017-2654Aug 6, 2018
    affected < 2.57.1fixed 2.57.1

    jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cas

  • CVE-2018-1000176May 8, 2018
    affected < 2.62fixed 2.62

    An exposure of sensitive information vulnerability exists in Jenkins Email Extension Plugin 2.61 and older in src/main/resources/hudson/plugins/emailext/ExtendedEmailPublisher/global.groovy and ExtendedEmailPublisherDescriptor.java that allows attackers with control of a Jenkins