Description
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Remediation
References
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1505
http://www.openwall.com/lists/oss-security/2019/09/25/3
Related Vulnerabilities
CVE-2020-11971 Vulnerability in maven package org.apache.camel:camel-management
CVE-2014-0034 Vulnerability in maven package org.apache.cxf.services.sts:cxf-services-sts-core
CVE-2015-7499 Vulnerability in npm package libxmljs
CVE-2023-37956 Vulnerability in maven package org.jenkins-ci.plugins:test-results-aggregator
CVE-2011-4838 Vulnerability in maven package org.jruby:jruby-core