Description
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Remediation
References
Related Vulnerabilities
WordPress Plugin GiveWP-Donation and Fundraising Platform Cross-Site Scripting (2.4.6)
WordPress Plugin iThemes Security (formerly Better WP Security) Security Bypass (5.3.5)
WordPress Plugin BuddyBoss Media Cross-Site Scripting (3.2.3)
Twisted Web HTTP Server Improper Certificate Validation Vulnerability (CVE-2014-7143)