Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-32979

Опубликовано: 16 мая 2023
Источник: redhat
CVSS3: 4.3

Описание

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

A flaw was found in the Jenkins Email Extension Plugin. Affected versions of the Jenkins Email Extension Plugin could allow a remote, authenticated attacker to obtain sensitive information caused by improper permission validation. By sending a specially crafted request, an attacker can check for the existence of files in the email-templates/ directory and use this information to launch further attacks against the affected system.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-266
https://bugzilla.redhat.com/show_bug.cgi?id=2207831jenkins-2-plugin: email-ext: Missing permission check in Email Extension Plugin

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
больше 2 лет назад

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CVSS3: 4.3
github
больше 2 лет назад

Jenkins Email Extension Plugin missing permission check

4.3 Medium

CVSS3