logo

CVE-2020-2287 org.jenkins-ci.plugins:audit-trail

Package

Manager: maven
Name: org.jenkins-ci.plugins:audit-trail
Vulnerable Version: >=0 <3.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00066 pctl0.20939

Details

Request logging bypass in Jenkins Audit Trail Plugin Audit Trail Plugin logs requests whose URL path matches an admin-configured regular expression. A discrepancy between the behavior of the plugin and the Stapler web framework in parsing URL paths allows attackers to craft URLs that would bypass request logging in Audit Trail Plugin 3.6 and earlier. This only applies to Jenkins 2.227 and earlier, LTS 2.204.5 and earlier, as the fix for [SECURITY-1774](https://www.jenkins.io/security/advisory/2020-03-25/#SECURITY-1774) prohibits dispatch of affected requests. Audit Trail Plugin 3.7 processes request URL paths the same way as the Stapler web framework.

Metadata

Created: 2022-02-10T20:29:39Z
Modified: 2023-12-21T13:51:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-rpj6-2q8r-98f8/GHSA-rpj6-2q8r-98f8.json
CWE IDs: ["CWE-435"]
Alternative ID: GHSA-rpj6-2q8r-98f8
Finding: F124
Auto approve: 1