Skip to content
This repository has been archived by the owner on Oct 2, 2023. It is now read-only.

CVE-2023-25761 (Medium) detected in junit-1.3.jar #183

Open
mend-bolt-for-github bot opened this issue Feb 17, 2023 · 0 comments
Open

CVE-2023-25761 (Medium) detected in junit-1.3.jar #183

mend-bolt-for-github bot opened this issue Feb 17, 2023 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link

mend-bolt-for-github bot commented Feb 17, 2023

CVE-2023-25761 - Medium Severity Vulnerability

Vulnerable Library - junit-1.3.jar

Allows JUnit-format test results to be published.

Library home page: http://wiki.jenkins-ci.org/display/JENKINS/JUnit+Plugin

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jenkins-ci/plugins/junit/1.3/junit-1.3.jar

Dependency Hierarchy:

  • git-4.2.1.jar (Root Library)
    • mailer-1.23.jar
      • display-url-api-1.0.jar
        • junit-1.3.jar (Vulnerable Library)

Found in HEAD commit: 97ed2b7fe477b78f0b26191e5950825314db7b2c

Found in base branch: master

Vulnerability Details

Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.

Publish Date: 2023-02-15

URL: CVE-2023-25761

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032

Release Date: 2023-02-15

Fix Resolution: org.jenkins-ci.plugins:junit:1166.1168.vd6b_8042a_06de


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Feb 17, 2023
@mend-bolt-for-github mend-bolt-for-github bot changed the title CVE-2023-25761 (High) detected in junit-1.3.jar CVE-2023-25761 (Medium) detected in junit-1.3.jar May 18, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants