Description
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/10/08/5
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2008
Related Vulnerabilities
CVE-2019-17352 Vulnerability in maven package com.jfinal:jfinal
CVE-2021-45046 Vulnerability in maven package org.apache.logging.log4j:log4j-core
CVE-2022-43670 Vulnerability in maven package org.apache.sling:org.apache.sling.cms
CVE-2023-22602 Vulnerability in maven package org.apache.shiro:shiro-spring-boot-starter
CVE-2019-16869 Vulnerability in maven package io.netty:netty