[JIRA] [analysis-core-plugin] (JENKINS-33033) Plugin Code Hijacked by Advertisement Malware?

2016-02-19 Thread ullrich.haf...@gmail.com (JIRA)
Title: Message Title
 
 
 
 
 
 
 
 
 
 
  
 
 Ulli Hafner resolved as Not A Defect 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 
 
This is intentional. Since we still have no donation model in Jenkins I integrated this small advertisement in my plug-ins. (Since this dis not really worked out I will remove it in the 2.0 release.) 
 
 
 
 
 
 
 
 
 
 Jenkins /  JENKINS-33033 
 
 
 
  Plugin Code Hijacked by Advertisement Malware?  
 
 
 
 
 
 
 
 
 

Change By:
 
 Ulli Hafner 
 
 
 

Status:
 
 Open Resolved 
 
 
 

Resolution:
 
 Not A Defect 
 
 
 
 
 
 
 
 
 
 
 
 

 
 Add Comment 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 
 
 
 

 This message was sent by Atlassian JIRA (v6.4.2#64017-sha1:e244265) 
 
 
 
 
  
 
 
 
 
 
 
 
 
   





-- 
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[JIRA] [analysis-core-plugin] (JENKINS-33033) Plugin Code Hijacked by Advertisement Malware?

2016-02-19 Thread devopsti...@gmail.com (JIRA)
Title: Message Title
 
 
 
 
 
 
 
 
 
 
  
 
 DevOps Tiger created an issue 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 
 Jenkins /  JENKINS-33033 
 
 
 
  Plugin Code Hijacked by Advertisement Malware?  
 
 
 
 
 
 
 
 
 

Issue Type:
 
  Bug 
 
 
 

Assignee:
 
 Ulli Hafner 
 
 
 

Components:
 

 analysis-core-plugin 
 
 
 

Created:
 

 19/Feb/16 11:41 AM 
 
 
 

Labels:
 

 plugin user-experience adware 
 
 
 

Priority:
 
  Minor 
 
 
 

Reporter:
 
 DevOps Tiger 
 
 
 
 
 
 
 
 
 
 
The plugin code seems to be infected by some kind of advertisement malware, which displays advertisement text in the Jenkins configuration interface.  
The code is clearly visible also in the github repo: https://github.com/jenkinsci/analysis-core-plugin/blob/9f8f492d2931981f91a06a8eb0123fd7d3cd1a58/src/main/resources/index.jelly 
Maybe it will start spreading to other plugins and after a while the Jenkins backend will look like a typical WordPress admin backend, so this should be removed quickly before this disease can spread across the whole ecosystem.