Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1odjQ4LWhncDYteHBxZs4AA1Vw
Jenkins Flaky Test Handler Plugin stored cross-site scripting vulnerability
Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents.
Flaky Test Handler Plugin 1.2.3 escapes JUnit test contents when showing them on the Jenkins UI.
Permalink: https://github.com/advisories/GHSA-hv48-hgp6-xpqfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1odjQ4LWhncDYteHBxZs4AA1Vw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: about 1 year ago
CVSS Score: 8.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Percentage: 0.00075
EPSS Percentile: 0.33529
Identifiers: GHSA-hv48-hgp6-xpqf, CVE-2023-40342
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-40342
- https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3223
- http://www.openwall.com/lists/oss-security/2023/08/16/3
- https://github.com/advisories/GHSA-hv48-hgp6-xpqf
Affected Packages
maven:org.jenkins-ci.plugins:flaky-test-handler
Affected Version Ranges: < 1.2.3Fixed in: 1.2.3