Description
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Remediation
References
https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2682
http://www.openwall.com/lists/oss-security/2022/07/27/1
Related Vulnerabilities
CVE-2020-6423 Vulnerability in maven package org.webjars.npm:electron
CVE-2023-27602 Vulnerability in maven package org.apache.linkis:linkis-storage-script-dev-server
CVE-2014-0168 Vulnerability in maven package org.jolokia:jolokia-core
CVE-2015-1814 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2020-2113 Vulnerability in maven package org.jenkins-ci.tools:git-parameter