| Summary: | [CVE 21] junit 4.12 CVEs found | ||
|---|---|---|---|
| Product: | [ROSA-based products] ROSA Fresh | Reporter: | Yury <y.tumanov> |
| Component: | System (kernel, glibc, systemd, bash, PAM...) | Assignee: | ROSA Linux Bugs <bugs> |
| Status: | RESOLVED INVALID | QA Contact: | ROSA Linux Bugs <bugs> |
| Severity: | normal | ||
| Priority: | Normal | CC: | s.matveev, y.tumanov |
| Version: | All | Flags: | y.tumanov:
secteam_verified+
|
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | CVE-2022-45380, | ||
| Whiteboard: | |||
| Platform: | 2021.1 | ROSA Vulnerability identifier: | |
| RPM Package: | ISO-related: | ||
| Bad POT generating: | Upstream: | ||
|
Description
Yury
2023-05-03 13:54:09 MSK
(In reply to Yury from comment #0) > Please patch CVEs for package junit version 4.12 > INFO (CVEs are): junit 4.12 cves found > CVE-2022-45380 > Desc: Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) > URLs in test report output to clickable links in an unsafe manner, resulting > in a stored cross-site scripting (XSS) vulnerability exploitable by > attackers with Item/Configure permission. > Link: https://nvd.nist.gov/vuln/detail/CVE-2022-45380 > Severity: MEDIUM Не для нашего пакета ,относится к Jenkins JUnit Plugin. Secteam approved |