Vulnerability Details : CVE-2017-2654
jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.
Vulnerability category: Information leak
Products affected by CVE-2017-2654
- cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-2654
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-2654
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST | |
3.7
|
LOW | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
2.2
|
1.4
|
Red Hat, Inc. |
CWE ids for CVE-2017-2654
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2017-2654
-
https://jenkins.io/security/advisory/2017-03-20/
Jenkins Security Advisory 2017-03-20Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2654
1613050 – (CVE-2017-2654) CVE-2017-2654 jenkins-email-ext: Emails were sent to addresses not associated with actual users of Jenkins by Mailer PluginIssue Tracking;Third Party Advisory
Jump to