First published: Wed Sep 06 2023(Updated: )
Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents.
Credit: 39769cd5-e6e2-4dc8-927e-97b3aa056f5b jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.tap4j:tap | <=2.3 | |
Jenkins | <=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41940
Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents resulting in a stored cross-site scripting (XSS) vulnerability.
The severity of CVE-2023-41940 is medium with a severity value of 5.4.
This vulnerability can be exploited by attackers who are able to control TAP file contents.
To fix CVE-2023-41940, update Jenkins TAP Plugin to version 2.4 or later.