Description
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
Remediation
References
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019
http://www.openwall.com/lists/oss-security/2023/02/15/4
Related Vulnerabilities
CVE-2022-31147 Vulnerability in maven package org.webjars.bower:jquery-validation
CVE-2022-43421 Vulnerability in maven package org.jenkins-ci.plugins:tuleap-git-branch-source
CVE-2023-41329 Vulnerability in maven package org.wiremock:wiremock
CVE-2017-1000398 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2019-3799 Vulnerability in maven package org.springframework.cloud:spring-cloud-config-server