CVE-2023-32979: Jenkins Email Extension Plugin missing permission check
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.28197%
CWE
Published
5/16/2023
Updated
11/7/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:email-ext | maven | < 2.96.1 | 2.96.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on missing permission checks in a form validation
method. Jenkins
plugin security patterns indicate:- 1) Form validation
methods follow doCheck[ParameterName]
pattern in DescriptorImpl
classes 2) Email template handling would logically have a method validating
template paths 3) The CVE
description explicitly mentions form validation
method hardening. While no patch diffs are available, the combination of Jenkins
plugin architecture patterns and advisory specifics strongly indicates EmailExtTemplate's
DescriptorImpl.doCheckTemplate
as the vulnerable method.