Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2289
Reference (s):
- https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1954
- URL: https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1954
- MLIST:[oss-security] 20201008 Multiple vulnerabilities in Jenkins plugins
- URL: http://www.openwall.com/lists/oss-security/2020/10/08/5

