Description
A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/06/11/1
http://www.securityfocus.com/bid/108747
https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412
Related Vulnerabilities
CVE-2022-34271 Vulnerability in maven package org.apache.atlas:atlas-intg
CVE-2019-16776 Vulnerability in maven package org.webjars.bower:npm
CVE-2020-2109 Vulnerability in maven package org.jenkins-ci.plugins.workflow:workflow-cps
CVE-2022-25312 Vulnerability in maven package org.apache.any23:apache-any23
CVE-2021-39151 Vulnerability in maven package com.thoughtworks.xstream:xstream