Description
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the default value shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.
Remediation
References
https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1709
http://www.openwall.com/lists/oss-security/2020/02/12/3
Related Vulnerabilities
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-common
CVE-2023-37895 Vulnerability in maven package org.apache.jackrabbit:jackrabbit-standalone
CVE-2020-8203 Vulnerability in npm package @sailshq/lodash
CVE-2022-24709 Vulnerability in npm package @awsui/components-react
CVE-2023-32989 Vulnerability in maven package org.jenkins-ci.plugins:azure-vm-agents