Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1odjQ4LWhncDYteHBxZs4AA1Vw

Jenkins Flaky Test Handler Plugin stored cross-site scripting vulnerability

Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents.

Flaky Test Handler Plugin 1.2.3 escapes JUnit test contents when showing them on the Jenkins UI.

Permalink: https://github.com/advisories/GHSA-hv48-hgp6-xpqf
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1odjQ4LWhncDYteHBxZs4AA1Vw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: about 1 year ago


CVSS Score: 8.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS Percentage: 0.00075
EPSS Percentile: 0.33529

Identifiers: GHSA-hv48-hgp6-xpqf, CVE-2023-40342
References: Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:flaky-test-handler
Affected Version Ranges: < 1.2.3
Fixed in: 1.2.3