Description
Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Remediation
References
https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617
Related Vulnerabilities
CVE-2015-5211 Vulnerability in maven package org.springframework:spring-web
CVE-2022-36892 Vulnerability in maven package org.jenkins-ci.plugins:rhnpush-plugin
CVE-2020-16022 Vulnerability in maven package org.webjars.npm:electron
CVE-2023-34104 Vulnerability in maven package org.webjars.npm:fast-xml-parser
CVE-2019-12418 Vulnerability in maven package org.apache.tomcat:tomcat-catalina