
Cloud Vulnerability DB
A community-led vulnerabilities database
Jenkins 360 FireLine Plugin 1.7.2 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download. The vulnerability was discovered and disclosed on October 19, 2022, affecting all versions up to and including 1.7.2 (Jenkins Advisory, OSS Security).
The vulnerability occurs when the 'Execute FireLine' build step is executed with the option 'Open access to HTML with JS or CSS' checked. The plugin globally disables the Content-Security-Policy header for static files served by Jenkins (specifically DirectoryBrowserSupport), such as workspaces, /userContent, or archived artifacts, unless a Resource Root URL is specified. The vulnerability has been assigned a CVSS severity rating of High (Jenkins Advisory).
This vulnerability allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc. Jenkins instances with Resource Root URL configured are unaffected (Jenkins Advisory).
As of the advisory publication date, there was no fix available for this vulnerability. Administrators can mitigate the risk by configuring a Resource Root URL in Jenkins, which prevents the vulnerability from being exploited (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."