CVE-2020-2288 – org.jenkins-ci.plugins:audit-trail
Package
Manager: maven
Name: org.jenkins-ci.plugins:audit-trail
Vulnerable Version: >=0 <3.7
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00066 pctl0.20918
Details
Incorrect default pattern in Jenkins Audit Trail Plugin Jenkins Audit Trail Plugin uses regular expressions to match requested URLs whose dispatch should be logged. In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling. Jenkins Audit Trail Plugin 3.7 changes the default regular expression pattern so that it allows for arbitrary suffixes. It automatically will replace previous default patterns with the new, more complete default pattern. Additionally, an administrative monitor is shown if a user-specified pattern is found to be bypassable through crafted URLs and form validation was improved to recognize patterns that would not match requests with arbitrary suffixes.
Metadata
Created: 2022-05-24T17:30:18Z
Modified: 2023-10-27T11:36:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7v9p-34r2-q668/GHSA-7v9p-34r2-q668.json
CWE IDs: ["CWE-185"]
Alternative ID: GHSA-7v9p-34r2-q668
Finding: F211
Auto approve: 1