Description
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/09/25/3
https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1505
Related Vulnerabilities
CVE-2020-6459 Vulnerability in maven package org.webjars.npm:electron
CVE-2022-36894 Vulnerability in maven package org.jenkins-ci.plugins:clif-performance-testing
CVE-2023-26269 Vulnerability in maven package org.apache.james:james-server-guice-jmx
CVE-2021-21391 Vulnerability in npm package @ckeditor/ckeditor5-widget
CVE-2020-2255 Vulnerability in maven package io.jenkins.blueocean:blueocean-parent