I'm using standalone latest Jenkins war on my Linux server running on port 9043.
The security-audit team reported "Cross-Site Scripting (XSS)" vulnerability for the below Jenkins URL.
https://myjenkinshost:9043/label/64_Salve/api/python
"64_Salve" happens to be a Jenkins slave node agent I had configured a few years back.
As a proof of concept they have shared the below:
Intercept request using proxy tool and modify the request as shown. When the response is viewed in browser, the file is downloaded as shown.
Then there is a pop-up that prompts for opening-saving "python" file.
Can you please suggest how can I address this vulnerability?