Miggo Logo

CVE-2020-2253:
Missing hostname validation in Email Extension Plugin

4.8

CVSS Score
3.1

Basic Information

EPSS Score
0.09022%
Published
5/24/2022
Updated
12/14/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:email-extmaven<= 2.752.76

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing hostname validation during SMTP TLS handshakes. The commit diff shows the fix explicitly adds a check for 'mail.smtp.ssl.checkserveridentity' in the createSession() method, defaulting it to 'true' if unset. This method is responsible for configuring SMTP connection properties, and its failure to enforce hostname validation prior to the patch directly enabled the vulnerability. The CWE-295 mapping confirms this is an improper certificate validation issue.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*m*il *xt*nsion Plu*in *.** *n* **rli*r *o*s not p*r*orm *ostn*m* v*li**tion w**n *onn**tin* to t** *on*i*ur** SMTP s*rv*r. T*is l**k o* v*li**tion *oul* ** **us** usin* * m*n-in-t**-mi**l* *tt**k to int*r**pt t**s* *onn**tions. *m*il *xt*nsion Plu*

Reasoning

T** vuln*r**ility st*ms *rom missin* *ostn*m* `v*li**tion` *urin* SMTP TLS **n*s**k*s. T** *ommit *i** s*ows t** *ix *xpli*itly ***s * ****k *or 'm*il.smtp.ssl.****ks*rv*ri**ntity' in t** `*r**t*S*ssion()` m*t*o*, ****ultin* it to 'tru*' i* uns*t. T*