CVE-2023-25761

Name
CVE-2023-25761
Description
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032
MLIST http://www.openwall.com/lists/oss-security/2023/02/15/4

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:jenkins:junit:*:*:*:*:*:jenkins:*:* jenkins >= None <= 1166.va_436e268e972

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins 3.17-community 2.361.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.18-community 2.387.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.19-community 2.440.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.20-community 2.440.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins edge-community 2.452.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable