CVE-2023-40342 – org.jenkins-ci.plugins:flaky-test-handler
Package
Manager: maven
Name: org.jenkins-ci.plugins:flaky-test-handler
Vulnerable Version: >=0 <1.2.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.03831 pctl0.87702
Details
Jenkins Flaky Test Handler Plugin stored cross-site scripting vulnerability Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents. Flaky Test Handler Plugin 1.2.3 escapes JUnit test contents when showing them on the Jenkins UI.
Metadata
Created: 2023-08-16T15:30:18Z
Modified: 2023-08-16T21:12:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-hv48-hgp6-xpqf/GHSA-hv48-hgp6-xpqf.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-hv48-hgp6-xpqf
Finding: F425
Auto approve: 1