logo

CVE-2023-40342 org.jenkins-ci.plugins:flaky-test-handler

Package

Manager: maven
Name: org.jenkins-ci.plugins:flaky-test-handler
Vulnerable Version: >=0 <1.2.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.03831 pctl0.87702

Details

Jenkins Flaky Test Handler Plugin stored cross-site scripting vulnerability Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents. Flaky Test Handler Plugin 1.2.3 escapes JUnit test contents when showing them on the Jenkins UI.

Metadata

Created: 2023-08-16T15:30:18Z
Modified: 2023-08-16T21:12:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-hv48-hgp6-xpqf/GHSA-hv48-hgp6-xpqf.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-hv48-hgp6-xpqf
Finding: F425
Auto approve: 1