This repository has been archived by the owner on Oct 2, 2023. It is now read-only.
CVE-2023-25761 (Medium) detected in junit-1.3.jar #183
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2023-25761 - Medium Severity Vulnerability
Vulnerable Library - junit-1.3.jar
Allows JUnit-format test results to be published.
Library home page: http://wiki.jenkins-ci.org/display/JENKINS/JUnit+Plugin
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jenkins-ci/plugins/junit/1.3/junit-1.3.jar
Dependency Hierarchy:
Found in HEAD commit: 97ed2b7fe477b78f0b26191e5950825314db7b2c
Found in base branch: master
Vulnerability Details
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
Publish Date: 2023-02-15
URL: CVE-2023-25761
CVSS 3 Score Details (5.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032
Release Date: 2023-02-15
Fix Resolution: org.jenkins-ci.plugins:junit:1166.1168.vd6b_8042a_06de
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: