Description
A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.
Remediation
References
https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412
http://www.openwall.com/lists/oss-security/2019/06/11/1
http://www.securityfocus.com/bid/108747
Related Vulnerabilities
CVE-2023-47324 Vulnerability in maven package org.silverpeas.core:silverpeas-core
CVE-2020-6428 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-2244 Vulnerability in maven package org.jenkins-ci.plugins:build-failure-analyzer
CVE-2022-35915 Vulnerability in npm package @openzeppelin/contracts
CVE-2022-46683 Vulnerability in maven package org.jenkins-ci.plugins:google-login