Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
{
"nvd_published_at": "2019-09-25T16:15:00Z",
"cwe_ids": [
"CWE-200",
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed_at": "2022-06-28T16:17:01Z",
"github_reviewed": true
}