Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically DirectoryBrowserSupport), such as workspaces, /userContent, or archived artifacts, unless a Resource Root URL is specified.
XFramium Builder Plugin 1.0.22 and earlier globally disables the Content-Security-Policy header for static files served by Jenkins as soon as it is loaded. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.
Jenkins instances with Resource Root URL configured are unaffected.
{
"nvd_published_at": "2022-10-19T16:15:00Z",
"cwe_ids": [
"CWE-693"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-10-19T22:03:44Z"
}