Hello there,

Nothing to care about at the moment for YUI as all the known 
vulnerabilities are related to the presence of the Flash files ("via .swf 
files"), they were removed from the library before it was included in 
Jenkins.
But the out-of-date status is still valid unfortunately.

Best regards,

Wadeck
On Monday, May 31, 2021 at 2:33:00 AM UTC+2 s.p...@gmail.com wrote:

> Thank you, Oleg. Thank you for sharing the link to report the 
> vulnerabilities. Appreciate your help!
>
> On Sunday, May 30, 2021 at 2:46:39 PM UTC-4 o.v.ne...@gmail.com wrote:
>
>> Hello,
>>
>> Thanks for your report. I will let the Jenkins security team members to 
>> comment on that. Just for your information, we have an official process for 
>> reporting security vulnerabilities. I highly recommend following this 
>> process. Please see 
>> https://www.jenkins.io/security/#reporting-vulnerabilities
>>
>> Best regards,
>> Oleg Nenashev
>>
>>
>>
>> On Sunday, May 30, 2021 at 3:05:00 AM UTC+2 s.p...@gmail.com wrote:
>>
>>> Our web scans shows out-of-date version(YUI) vulnerability. I'm not able 
>>> to find anything on how to remediate this finding. Any help is appreciated. 
>>> TIA
>>> Example :  /static/01babc68/scripts/yui/yahoo/yahoo-min.js 
>>> Affected versions of the package are vulnerable to Cross-site 
>>> Scripting(XSS) via .swf files, allowing arbitary code injection into 
>>> hosting server CVE-2012-5881 CVE-2012-5883
>>>
>>> *Jenkins version - 2.250 , windows 2012 server.*
>>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"Jenkins Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to jenkinsci-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jenkinsci-users/7ce8af98-d252-4c46-bf84-5b82294db5aen%40googlegroups.com.

Reply via email to