Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1427 | Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action. |
Github GHSA |
GHSA-xj29-gfww-j67g | Jenkins JaCoCo Plugin vulnerable to Stored Cross-site Scripting |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 25 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-25T19:21:31.567Z
Reserved: 2023-03-20T19:59:08.755Z
Link: CVE-2023-28669
Updated: 2024-08-02T13:43:23.665Z
Status : Modified
Published: 2023-04-02T21:15:08.807
Modified: 2025-02-25T20:15:33.130
Link: CVE-2023-28669
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA