Description
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Remediation
References
Related Vulnerabilities
WordPress Plugin White Label CMS Cross-Site Scripting (2.2.8)
WordPress Plugin MiniMax-Page Layout Builder Arbitrary File Upload (1.7.1)
SharePoint CVE-2019-1260 Vulnerability (CVE-2019-1260)
Grafana Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-23498)
WordPress Plugin WP Job Manager Unspecified Vulnerability (1.32.2)