Description
A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/06/11/1
http://www.securityfocus.com/bid/108747
https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412
Related Vulnerabilities
CVE-2023-26136 Vulnerability in maven package org.webjars.npm:tough-cookie
CVE-2019-10281 Vulnerability in maven package org.jenkins-ci.plugins:relution-publisher
CVE-2020-7766 Vulnerability in maven package org.webjars.npm:json-ptr
CVE-2020-36732 Vulnerability in maven package org.webjars.bower:crypto-js