Vulnerable Systems:
* Jenkins CI Jenkins 1.454 and prior
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, influence or misrepresent how web content is served, cached, or interpreted, and conduct phishing attacks. Other attacks may also be possible.