Request URL Path Bypass in Jenkins Audit Trail Plugin
CVE-2020-2287

5.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
8 October 2020

Summary

The Jenkins Audit Trail Plugin fails to properly match patterns for request URLs due to discrepancies in how URL paths are handled by the Stapler web framework. This flaw allows an attacker to create malicious URLs that circumvent the plugin’s logging functionality, potentially enabling unauthorized access to sensitive actions without being recorded in the audit trail.

Affected Version(s)

Jenkins Audit Trail Plugin <= 3.6

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.