First published: Wed Oct 19 2022(Updated: )
Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Neuvector Vulnerability Scanner | <=1.20 | |
maven/io.jenkins.plugins:neuvector-vulnerability-scanner | <=1.20 | 1.22 |
<=1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins NeuVector Vulnerability Scanner Plugin vulnerability is CVE-2022-43434.
The title of this vulnerability is 'Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces'.
The severity of CVE-2022-43434 is medium with a CVSS score of 5.3.
CVE-2022-43434 affects the NeuVector Vulnerability Scanner Plugin in Jenkins versions 1.20 and earlier by programmatically disabling Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.
Yes, a fix is available for CVE-2022-43434. It is recommended to update to a fixed version of the NeuVector Vulnerability Scanner Plugin to mitigate the vulnerability.