Description
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
Published: 2020-10-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-1178 Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
Github GHSA Github GHSA GHSA-rpj6-2q8r-98f8 Request logging bypass in Jenkins Audit Trail Plugin
History

No history.

Subscriptions

Jenkins Audit Trail
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-04T07:01:41.267Z

Reserved: 2019-12-05T00:00:00.000Z

Link: CVE-2020-2287

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-08T13:15:11.407

Modified: 2024-11-21T05:25:12.613

Link: CVE-2020-2287

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.