Description
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Remediation
References
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939
http://www.openwall.com/lists/oss-security/2023/02/15/4
Related Vulnerabilities
CVE-2023-36470 Vulnerability in maven package org.xwiki.platform:xwiki-platform-icon-script
CVE-2022-39263 Vulnerability in npm package next-auth
CVE-2022-34113 Vulnerability in maven package io.dataease:dataease-plugin-common
CVE-2021-41183 Vulnerability in maven package org.webjars.bower:jquery-ui
CVE-2023-40342 Vulnerability in maven package org.jenkins-ci.plugins:flaky-test-handler