Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.
History

Tue, 25 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-25T19:21:31.567Z

Reserved: 2023-03-20T19:59:08.755Z

Link: CVE-2023-28669

cve-icon Vulnrichment

Updated: 2024-08-02T13:43:23.665Z

cve-icon NVD

Status : Modified

Published: 2023-04-02T21:15:08.807

Modified: 2025-02-25T20:15:33.130

Link: CVE-2023-28669

cve-icon Redhat

No data.