Request URL Path Bypass in Jenkins Audit Trail Plugin
CVE-2020-2287
5.3MEDIUM
Summary
The Jenkins Audit Trail Plugin fails to properly match patterns for request URLs due to discrepancies in how URL paths are handled by the Stapler web framework. This flaw allows an attacker to create malicious URLs that circumvent the plugin’s logging functionality, potentially enabling unauthorized access to sensitive actions without being recorded in the audit trail.
Affected Version(s)
Jenkins Audit Trail Plugin <= 3.6
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved