org.jvnet.hudson.plugins:analysis-core@1.13 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.jvnet.hudson.plugins:analysis-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

org.jvnet.hudson.plugins:analysis-core is a Jenkins plugin to read static analysis reports into a Java object model.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the "Details" view.

How to fix Cross-site Scripting (XSS)?

Upgrade org.jvnet.hudson.plugins:analysis-core to version 1.92 or higher.

[,1.92)
  • H
Cross-site Scripting (XSS)

org.jvnet.hudson.plugins:analysis-core is a Jenkins plugin to read static analysis reports into a Java object model.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for org.jvnet.hudson.plugins:analysis-core.

[0,)
  • M
Access Control Bypass

org.jvnet.hudson.plugins:analysis-core is a Jenkins plugin to read static analysis reports into a Java object model.

Affected versions of this package are vulnerable to Access Control Bypass. A missing permission check within DefaultGraphConfigurationView#doSave form handler method allows attackers with Overall/Read permission to change the per-job default graph configuration for all users.

How to fix Access Control Bypass?

Upgrade org.jvnet.hudson.plugins:analysis-core to version 1.96 or higher.

[,1.96)
  • M
Cross-site Request Forgery (CSRF)

org.jvnet.hudson.plugins:analysis-core is a Jenkins plugin to read static analysis reports into a Java object model.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). The DefaultGraphConfigurationView#doSave form handler method does not require POST requests, allowing attackers to change the per-job default graph configuration for all users.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.jvnet.hudson.plugins:analysis-core to version 1.96 or higher.

[,1.96)