logo

CVE-2022-43435 org.jenkins-ci.plugins.plugin:fireline

Package

Manager: maven
Name: org.jenkins-ci.plugins.plugin:fireline
Vulnerable Version: >=0 <=1.7.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00268 pctl0.50025

Details

Content-Security-Policy protection for user content can be disabled in Jenkins 360 FireLine Plugin Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified. 360 FireLine Plugin 1.7.2 and earlier globally disables the `Content-Security-Policy` header for static files served by Jenkins whenever the 'Execute FireLine' build step is executed, if the option 'Open access to HTML with JS or CSS' is checked. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc. Jenkins instances with [Resource Root URL](https://www.jenkins.io/doc/book/security/user-content/#resource-root-url) configured are unaffected.

Metadata

Created: 2022-10-19T19:00:18Z
Modified: 2022-12-16T20:01:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-7rrj-hqv6-fvpp/GHSA-7rrj-hqv6-fvpp.json
CWE IDs: ["CWE-693"]
Alternative ID: GHSA-7rrj-hqv6-fvpp
Finding: F115
Auto approve: 1