20 lines
762 B
JSON
Raw Normal View History

{
"id": "CVE-2023-32979",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.673",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system."
}
],
"metrics": {},
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(1)",
"source": "jenkinsci-cert@googlegroups.com"
}
]
}