Description
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/10/08/5
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2008
Related Vulnerabilities
CVE-2022-35204 Vulnerability in npm package vite
CVE-2022-3171 Vulnerability in maven package com.google.protobuf:protobuf-kotlin-lite
CVE-2020-8127 Vulnerability in maven package org.webjars.npm:reveal.js
CVE-2017-12617 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2016-3086 Vulnerability in maven package org.apache.hadoop:hadoop-common