Jenkins

Email Extension

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Published 16.05.2023 16:15:10
  • Last modified 23.01.2025 16:15:29

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home dir...

  • EPSS 0.14%
  • Published 16.05.2023 16:15:10
  • Last modified 23.01.2025 16:15:29

A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job.

  • EPSS 4.68%
  • Published 15.02.2023 14:15:13
  • Last modified 19.03.2025 19:15:39

Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.

  • EPSS 4.68%
  • Published 15.02.2023 14:15:13
  • Last modified 19.03.2025 17:15:38

Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by atta...

  • EPSS 0.03%
  • Published 15.02.2023 14:15:13
  • Last modified 19.03.2025 17:15:38

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary ...

  • EPSS 0.04%
  • Published 16.09.2020 14:15:13
  • Last modified 21.11.2024 05:25:06

Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server.

  • EPSS 0.05%
  • Published 12.08.2020 14:15:13
  • Last modified 21.11.2024 05:25:01

Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.

  • EPSS 0.09%
  • Published 08.03.2019 21:29:00
  • Last modified 21.11.2024 04:17:46

A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/mai...

  • EPSS 0.06%
  • Published 06.08.2018 22:29:00
  • Last modified 21.11.2024 03:23:55

jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful...

  • EPSS 0.1%
  • Published 08.05.2018 15:29:00
  • Last modified 21.11.2024 03:39:51

An exposure of sensitive information vulnerability exists in Jenkins Email Extension Plugin 2.61 and older in src/main/resources/hudson/plugins/emailext/ExtendedEmailPublisher/global.groovy and ExtendedEmailPublisherDescriptor.java that allows attack...