CVE-2020-2253:
Missing hostname validation in Email Extension Plugin
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.09022%
CWE
Published
5/24/2022
Updated
12/14/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:email-ext | maven | <= 2.75 | 2.76 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing hostname validation
during SMTP TLS handshakes. The commit diff shows the fix explicitly adds a check for 'mail.smtp.ssl.checkserveridentity' in the createSession()
method, defaulting it to 'true' if unset. This method is responsible for configuring SMTP connection properties, and its failure to enforce hostname validation
prior to the patch directly enabled the vulnerability. The CWE-295 mapping confirms this is an improper certificate validation
issue.