Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1482 | Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system. |
Github GHSA |
GHSA-6gp4-2f92-j2w5 | Jenkins Email Extension Plugin missing permission check |
Thu, 23 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-23T16:04:34.885Z
Reserved: 2023-05-16T10:55:43.518Z
Link: CVE-2023-32979
Updated: 2024-08-02T15:32:46.506Z
Status : Modified
Published: 2023-05-16T16:15:10.673
Modified: 2025-01-23T16:15:29.793
Link: CVE-2023-32979
OpenCVE Enrichment
No data.
EUVD
Github GHSA