Description
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/02/15/4
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019
Related Vulnerabilities
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-beam-sql
CVE-2022-31159 Vulnerability in maven package com.amazonaws:aws-java-sdk-s3
CVE-2021-27644 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-server
CVE-2020-8137 Vulnerability in npm package uppy
CVE-2023-40338 Vulnerability in maven package org.jenkins-ci.plugins:cloudbees-folder