CVE-2023-28669: Jenkins JaCoCo Plugin vulnerable to Stored Cross-site Scripting
(updated )
Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the ‘Record JaCoCo coverage report’ post-build action. Version 3.3.2.1 escapes class and method names shown on the UI.
References
Detect and mitigate CVE-2023-28669 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →