
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-23905 affects the Jenkins Red Hat Dependency Analytics Plugin versions 0.7.1 and earlier. The vulnerability was discovered and reported by Pierre Beitz from CloudBees, Inc. and was disclosed on January 24, 2024. The vulnerability involves the plugin programmatically disabling Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, and other content that Jenkins offers for download (Jenkins Advisory).
The vulnerability occurs when the plugin globally disables the Content-Security-Policy header for static files served by Jenkins (specifically DirectoryBrowserSupport), such as workspaces, /userContent, or archived artifacts. This behavior is triggered whenever the 'Invoke Red Hat Dependency Analytics (RHDA)' build step is executed. The vulnerability has been assigned a CVSS severity rating of High (Jenkins Advisory).
This vulnerability enables cross-site scripting (XSS) attacks by users who have the ability to control files in workspaces, archived artifacts, and other content. However, Jenkins instances with Resource Root URL configured are not affected by this vulnerability (Jenkins Advisory).
The vulnerability has been fixed in Red Hat Dependency Analytics Plugin version 0.9.0, which no longer disables the Content-Security-Policy header for static files served by Jenkins. Users are advised to upgrade to this version to mitigate the vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."