Description
Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784
Related Vulnerabilities
CVE-2015-8854 Vulnerability in maven package org.webjars:marked
CVE-2017-15717 Vulnerability in maven package org.apache.sling:org.apache.sling.xss.compat
CVE-2020-6427 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-15777 Vulnerability in maven package com.gradle:gradle-enterprise-maven-extension
CVE-2017-15691 Vulnerability in maven package org.apache.uima:uima-as