CVE-2023-40342
https://notcve.org/view.php?id=CVE-2023-40342
Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents. • http://www.openwall.com/lists/oss-security/2023/08/16/3 https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3223 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-28140
https://notcve.org/view.php?id=CVE-2022-28140
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. Jenkins Flaky Test Handler Plugin versiones 1.2.1 y anteriores, no configuran su analizador XML para prevenir ataques de tipo XML external entity (XXE) • http://www.openwall.com/lists/oss-security/2022/03/29/1 https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2020-2237
https://notcve.org/view.php?id=CVE-2020-2237
A cross-site request forgery (CSRF) vulnerability in Jenkins Flaky Test Handler Plugin 1.0.4 and earlier allows attackers to rebuild a project at a previous git revision. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en Jenkins Flaky Test Handler Plugin versiones 1.0.4 y anteriores, permite a atacantes reconstruir un proyecto en una revisión de git anterior • http://www.openwall.com/lists/oss-security/2020/08/12/4 https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1763 • CWE-352: Cross-Site Request Forgery (CSRF) •