Description
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
Remediation
References
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032
http://www.openwall.com/lists/oss-security/2023/02/15/4
Related Vulnerabilities
CVE-2023-29201 Vulnerability in maven package org.xwiki.commons:xwiki-commons-xml
CVE-2016-2162 Vulnerability in maven package org.apache.struts.xwork:xwork-core
CVE-2019-10409 Vulnerability in maven package hudson.plugins:project-inheritance
CVE-2022-29265 Vulnerability in maven package org.apache.nifi:nifi
CVE-2020-2206 Vulnerability in maven package org.jenkins-ci.plugins:vncrecorder