Content-Security-Policy Bypass in Jenkins NeuVector Vulnerability Scanner Plugin
CVE-2022-43434
5.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 19 October 2022
Summary
The Jenkins NeuVector Vulnerability Scanner Plugin, prior to version 1.21, contains a vulnerability that programmatically disables Content-Security-Policy (CSP) protections. This flaw affects user-generated content in workspaces and archived artifacts, allowing malicious actors to exploit this weakness and potentially compromise the integrity and security of the application. In environments utilizing this plugin, the absence of effective CSP can lead to various security risks, including cross-site scripting (XSS) attacks.
Affected Version(s)
Jenkins NeuVector Vulnerability Scanner Plugin <= 1.20
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved