Description
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/02/15/4
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934
Related Vulnerabilities
CVE-2021-28099 Vulnerability in maven package com.netflix.hollow:hollow
CVE-2022-41881 Vulnerability in maven package io.netty:netty-codec-haproxy
CVE-2022-46907 Vulnerability in maven package org.apache.jspwiki:jspwiki-war
CVE-2022-36900 Vulnerability in maven package com.compuware.jenkins:compuware-zadviser-api
CVE-2022-45392 Vulnerability in maven package io.jenkins.plugins:cavisson-ns-nd-integration