Description
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/07/27/1
https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2682
Related Vulnerabilities
CVE-2019-14862 Vulnerability in maven package org.jszip.redist:knockout
CVE-2022-0722 Vulnerability in maven package org.webjars.npm:parse-url
CVE-2019-15599 Vulnerability in maven package org.webjars.npm:tree-kill
CVE-2022-31197 Vulnerability in maven package org.postgresql:postgresql
CVE-2022-43427 Vulnerability in maven package com.compuware.jenkins:compuware-topaz-for-total-test