Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3061 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jenkins
Published: 2023-03-23T11:26:00.146Z
Updated: 2023-10-24T12:49:13.341Z
Reserved: 2023-03-20T19:59:08.755Z
Link: CVE-2023-28669
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-04-02T21:15:08.807
Modified: 2023-04-07T19:57:57.803
Link: CVE-2023-28669
JSON object: View
Redhat Information
No data.
CWE