Description
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/10/08/5
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2008
Related Vulnerabilities
CVE-2019-10377 Vulnerability in maven package net.hurstfrost.jenkins:avatar
CVE-2019-16777 Vulnerability in npm package npm
CVE-2018-20676 Vulnerability in maven package org.fujion.webjars:bootstrap
CVE-2020-15366 Vulnerability in maven package org.webjars.bowergithub.ajv-validator:ajv
CVE-2020-7663 Vulnerability in maven package org.webjars.npm:websocket-extensions