CVE-2022-43435 – org.jenkins-ci.plugins.plugin:fireline
Package
Manager: maven
Name: org.jenkins-ci.plugins.plugin:fireline
Vulnerable Version: >=0 <=1.7.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00268 pctl0.50025
Details
Content-Security-Policy protection for user content can be disabled in Jenkins 360 FireLine Plugin Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified. 360 FireLine Plugin 1.7.2 and earlier globally disables the `Content-Security-Policy` header for static files served by Jenkins whenever the 'Execute FireLine' build step is executed, if the option 'Open access to HTML with JS or CSS' is checked. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc. Jenkins instances with [Resource Root URL](https://www.jenkins.io/doc/book/security/user-content/#resource-root-url) configured are unaffected.
Metadata
Created: 2022-10-19T19:00:18Z
Modified: 2022-12-16T20:01:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-7rrj-hqv6-fvpp/GHSA-7rrj-hqv6-fvpp.json
CWE IDs: ["CWE-693"]
Alternative ID: GHSA-7rrj-hqv6-fvpp
Finding: F115
Auto approve: 1