First published: Wed Feb 15 2023(Updated: )
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:junit | <=1166.va | 1166.1168.vd6b_8042a_06de |
Jenkins Junit | <=1166.va_436e268e972 | |
redhat/JUnit Plugin | <1166.1168. | 1166.1168. |
redhat/jenkins | <2-plugins-0:4.11.1683009941-1.el8 | 2-plugins-0:4.11.1683009941-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1683009955-1.el8 | 2-plugins-0:4.12.1683009955-1.el8 |
redhat/jenkins | <2-plugins-0:4.13.1684911916-1.el8 | 2-plugins-0:4.13.1684911916-1.el8 |
redhat/jenkins | <2-plugins-0:4.10.1681719745-1.el8 | 2-plugins-0:4.10.1681719745-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-25761 is a vulnerability in the Jenkins JUnit Plugin that allows for stored cross-site scripting (XSS) attacks.
CVE-2023-25761 has a severity score of 5.4, which is considered medium.
CVE-2023-25761 affects the JUnit Plugin in Jenkins and allows attackers to perform stored XSS attacks.
Yes, the recommended fix for CVE-2023-25761 is to update the JUnit Plugin to version 4.12.1683009955-1.el8 or later.
You can find more information about CVE-2023-25761 on the CVE website, the NVD website, and the Jenkins Security Advisory page.