Lucene search

K
githubGitHub Advisory DatabaseGHSA-7RRJ-HQV6-FVPP
HistoryOct 19, 2022 - 7:00 p.m.

Content-Security-Policy protection for user content can be disabled in Jenkins 360 FireLine Plugin

2022-10-1919:00:18
CWE-693
GitHub Advisory Database
github.com
14
jenkins
360 fireline plugin
content-security-policy
xss attacks
resource root url

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.7%

Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically DirectoryBrowserSupport), such as workspaces, /userContent, or archived artifacts, unless a Resource Root URL is specified.

360 FireLine Plugin 1.7.2 and earlier globally disables the Content-Security-Policy header for static files served by Jenkins whenever the ‘Execute FireLine’ build step is executed, if the option ‘Open access to HTML with JS or CSS’ is checked. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.

Jenkins instances with Resource Root URL configured are unaffected.

Affected configurations

Vulners
Node
org.jenkinsci.plugins.plugin\Matchfireline

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

33.7%

Related for GHSA-7RRJ-HQV6-FVPP