Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-02T13:43:23.665Z
Reserved: 2023-03-20T19:59:08.755Z
Link: CVE-2023-28669

No data.

Status : Modified
Published: 2023-04-02T21:15:08.807
Modified: 2024-11-21T07:55:46.473
Link: CVE-2023-28669

No data.