fix(deps): update dependency org.jenkins-ci.plugins:junit to v1166 [security] #5026
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.24
->1166.1168.vd6b_8042a_06de
GitHub Vulnerability Alerts
CVE-2022-45380
JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links.
This is done in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
JUnit Plugin 1160.vf1f01a_a_ea_b_7f no longer converts URLs to clickable links.
CVE-2022-34176
JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
JUnit Plugin 1119.1121.vc43d0fc45561 applies the configured markup formatter to descriptions of test results.
CVE-2023-25761
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
CVE-2018-1000411
A cross-site request forgery vulnerability exists in Jenkins JUnit Plugin 1.25 and earlier in TestObject.java that allows setting the description of a test result.
Release Notes
jenkinsci/junit-plugin (org.jenkins-ci.plugins:junit)
v1166.1168.vd6b_8042a_06de
Compare Source
v1166.va_436e268e972
Compare Source
🚀 New features and improvements
✍ Other changes
📦 Dependency updates
v1160.vf1f01a_a_ea_b_7f
Compare Source
v1159.v0b_396e1e07dd
Compare Source
👷 Changes for plugin developers
📦 Dependency updates
v1156.vcf492e95a_a_b_0
Compare Source
📦 Dependency updates
v1153.v1c24f1a_d2553
Compare Source
🚀 New features and improvements
📦 Dependency updates
v1150.v5c2848328b_60
Compare Source
🚀 New features and improvements
script
block in "failed-test.jelly" to external file (#439) @Jagrutiti👻 Maintenance
📦 Dependency updates
v1144.v909f4d9978e8
Compare Source
🚀 New features and improvements
v1143.1145.v81b_b_9579a_019
Compare Source
v1143.v8d9a_e3355270
Compare Source
🚦 Tests
📦 Dependency updates
v1119.1124.va_a_8ccde5658f
Compare Source
v1119.1122.v750e65d31b_db_
Compare Source
v1119.1121.vc43d0fc45561
Compare Source
v1119.va_a_5e9068da_d7
👻 Automatic releases are now enabled on merge to master
This comes with a new version number format, see https://www.jenkins.io/jep/229
🚀 New features and improvements
skipOldReports
defaulted to false) (#384) @olamy🐛 Bug fixes
📝 Documentation updates
📦 Dependency updates
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.