[JIRA] [analysis-core-plugin] (JENKINS-33033) Plugin Code Hijacked by Advertisement Malware?
Title: Message Title Ulli Hafner resolved as Not A Defect This is intentional. Since we still have no donation model in Jenkins I integrated this small advertisement in my plug-ins. (Since this dis not really worked out I will remove it in the 2.0 release.) Jenkins / JENKINS-33033 Plugin Code Hijacked by Advertisement Malware? Change By: Ulli Hafner Status: Open Resolved Resolution: Not A Defect Add Comment This message was sent by Atlassian JIRA (v6.4.2#64017-sha1:e244265) -- You received this message because you are subscribed to the Google Groups "Jenkins Issues" group. To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[JIRA] [analysis-core-plugin] (JENKINS-33033) Plugin Code Hijacked by Advertisement Malware?
Title: Message Title DevOps Tiger created an issue Jenkins / JENKINS-33033 Plugin Code Hijacked by Advertisement Malware? Issue Type: Bug Assignee: Ulli Hafner Components: analysis-core-plugin Created: 19/Feb/16 11:41 AM Labels: plugin user-experience adware Priority: Minor Reporter: DevOps Tiger The plugin code seems to be infected by some kind of advertisement malware, which displays advertisement text in the Jenkins configuration interface. The code is clearly visible also in the github repo: https://github.com/jenkinsci/analysis-core-plugin/blob/9f8f492d2931981f91a06a8eb0123fd7d3cd1a58/src/main/resources/index.jelly Maybe it will start spreading to other plugins and after a while the Jenkins backend will look like a typical WordPress admin backend, so this should be removed quickly before this disease can spread across the whole ecosystem.