Description
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Remediation
References
Related Vulnerabilities
WordPress Plugin Another WordPress Classifieds Cross-Site Scripting (3.3.1)
WordPress Plugin The Events Calendar Security Bypass (3.11.2)
WordPress Plugin Gravity Forms Cross-Site Scripting (2.0.6.5)
Dolphin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3728)
WordPress Plugin Page Showcaser Boxes Cross-Site Scripting (1.1)