Description
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
Remediation
References
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019
http://www.openwall.com/lists/oss-security/2023/02/15/4
Related Vulnerabilities
CVE-2022-34204 Vulnerability in maven package com.geteasyqa:easyqa
CVE-2022-4147 Vulnerability in maven package io.quarkus:quarkus-vertx-http-deployment
CVE-2023-40167 Vulnerability in maven package org.eclipse.jetty:jetty-http
CVE-2022-4742 Vulnerability in npm package json-pointer
CVE-2021-41184 Vulnerability in maven package org.webjars.bowergithub.jquery:jquery-ui