Vulnerabilities > Jenkins > Junit > 1.19

DATE CVE VULNERABILITY TITLE RISK
2023-02-15 CVE-2023-25761 Cross-site Scripting vulnerability in Jenkins Junit
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
network
low complexity
jenkins CWE-79
5.4
2022-11-15 CVE-2022-45380 Cross-site Scripting vulnerability in Jenkins Junit
Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
network
low complexity
jenkins CWE-79
5.4
2022-06-23 CVE-2022-34176 Cross-site Scripting vulnerability in Jenkins Junit
Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
network
low complexity
jenkins CWE-79
5.4
2019-01-09 CVE-2018-1000411 Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Junit
A cross-site request forgery vulnerability exists in Jenkins JUnit Plugin 1.25 and earlier in TestObject.java that allows setting the description of a test result.
network
jenkins CWE-352
4.3
2018-02-09 CVE-2018-1000056 Server-Side Request Forgery (SSRF) vulnerability in Jenkins Junit
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
network
low complexity
jenkins CWE-918
6.5