Description
Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2410 | Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents. |
Github GHSA |
GHSA-3vcr-579j-4x48 | Stored XSS vulnerability in Jenkins TAP Plugin |
References
History
Fri, 27 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-27T19:48:04.346Z
Reserved: 2023-09-05T16:39:57.394Z
Link: CVE-2023-41940
Updated: 2024-08-02T19:09:49.272Z
Status : Modified
Published: 2023-09-06T13:15:11.027
Modified: 2024-11-21T08:21:57.853
Link: CVE-2023-41940
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA