Описание
Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Ссылки
- Mailing List
- Vendor Advisory
- Mailing List
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1160.vf1f01a_a_ea_b_7f (исключая)
cpe:2.3:a:jenkins:junit:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 67%
0.00548
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 8
redhat
почти 3 года назад
Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVSS3: 8
github
почти 3 года назад
Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion
EPSS
Процентиль: 67%
0.00548
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79