Description
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Remediation
References
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2008
http://www.openwall.com/lists/oss-security/2020/10/08/5
Related Vulnerabilities
CVE-2011-4343 Vulnerability in maven package org.apache.myfaces.core:myfaces-api
CVE-2020-11022 Vulnerability in maven package org.webjars:jquery
CVE-2022-45143 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2022-4361 Vulnerability in maven package org.keycloak:keycloak-services