[JENKINS:SECURITY-2863] Content-Security-Policy protection for user content disabled by `xframium`

Severity High
Affected Packages 2
CVEs 1

Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically DirectoryBrowserSupport), such as workspaces, /userContent, or archived artifacts, unless a Resource Root URL is specified.

xframium 1.0.22 and earlier globally disables the Content-Security-Policy header for static files served by Jenkins as soon as it is loaded.
This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.

NOTE: Jenkins instances with link:/doc/book/security/user-content/#resource-root-url[Resource Root URL] configured are unaffected.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2863
Severity
high
Published
2022-10-19T00:00:00
(23 months ago)
Modified
2022-10-19T00:00:00
(23 months ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository xframium repository https://github.com/jenkinsci/xframium-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/xframium org.jenkins-ci.plugins xframium <= 1.0.22
Affected pkg:github/jenkinsci/xframium-plugin jenkinsci xframium-plugin <= 1.0.22
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...