Description
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Remediation
References
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939
http://www.openwall.com/lists/oss-security/2023/02/15/4
Related Vulnerabilities
CVE-2023-37963 Vulnerability in maven package io.jenkins.plugins:benchmark-evaluator
CVE-2023-33265 Vulnerability in maven package com.hazelcast:hazelcast
CVE-2021-41183 Vulnerability in maven package org.webjars.bower:jquery-ui
CVE-2017-2654 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2023-36478 Vulnerability in maven package org.eclipse.jetty:jetty-http