
CVE-2023-32980 – jenkins-2-plugin: email-ext: CSRF vulnerability in Email Extension Plugin
https://notcve.org/view.php?id=CVE-2023-32980
16 May 2023 — A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job. A flaw was found in the Jenkins Email Extension Plugin. Affected versions of the Jenkins Email Extension Plugin are vulnerable to cross-site request forgery caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to make another u... • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(2) • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2023-32979 – jenkins-2-plugin: email-ext: Missing permission check in Email Extension Plugin
https://notcve.org/view.php?id=CVE-2023-32979
16 May 2023 — Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system. A flaw was found in the Jenkins Email Extension Plugin. Affected versions of the Jenkins Email Extension Plugin could allow a remote, authenticated attacker to obtain sensitive information caused by improper permission valid... • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(1) • CWE-266: Incorrect Privilege Assignment CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-25763
https://notcve.org/view.php?id=CVE-2023-25763
15 Feb 2023 — Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields. • http://www.openwall.com/lists/oss-security/2023/02/15/4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-25764
https://notcve.org/view.php?id=CVE-2023-25764
15 Feb 2023 — Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates. • http://www.openwall.com/lists/oss-security/2023/02/15/4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-25765
https://notcve.org/view.php?id=CVE-2023-25765
15 Feb 2023 — In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. • http://www.openwall.com/lists/oss-security/2023/02/15/4 • CWE-693: Protection Mechanism Failure •

CVE-2020-2253
https://notcve.org/view.php?id=CVE-2020-2253
16 Sep 2020 — Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server. Jenkins Email Extension Plugin versiones 2.75 y anteriores, no lleva a cabo la comprobación del hostname cuando se conecta al servidor SMTP configurado • http://www.openwall.com/lists/oss-security/2020/09/16/3 • CWE-295: Improper Certificate Validation •

CVE-2020-2232
https://notcve.org/view.php?id=CVE-2020-2232
12 Aug 2020 — Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure. Jenkins Email Extension Plugin versiones 2.72 y 2.73, transmite y muestra la contraseña SMTP en texto plano como parte del formulario de configuración global de Jenkins, resultando potencialmente en su exposición • http://www.openwall.com/lists/oss-security/2020/08/12/4 • CWE-319: Cleartext Transmission of Sensitive Information •

CVE-2019-1003032
https://notcve.org/view.php?id=CVE-2019-1003032
08 Mar 2019 — A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src/main/java/hudson/plugins/emailext/plugins/trigger/AbstractScriptTrigger.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM. Existe un... • http://www.securityfocus.com/bid/107476 •

CVE-2017-2654
https://notcve.org/view.php?id=CVE-2017-2654
06 Aug 2018 — jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses. j... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2654 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2018-1000176
https://notcve.org/view.php?id=CVE-2018-1000176
08 May 2018 — An exposure of sensitive information vulnerability exists in Jenkins Email Extension Plugin 2.61 and older in src/main/resources/hudson/plugins/emailext/ExtendedEmailPublisher/global.groovy and ExtendedEmailPublisherDescriptor.java that allows attackers with control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured SMTP password. Existe una vulnerabilidad de exposición de información sensible en el plugin Email Extension en versiones 2.61 y posteriores para Jenki... • https://jenkins.io/security/advisory/2018-04-16 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •