Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-32979


Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.


Published

2023-05-16T16:15:10.673

Last Modified

2025-01-23T16:15:29.793

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.3 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-732
  • Type: Secondary
    CWE-732

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application jenkins email_extension ≤ 2.96 Yes

References