Bypass Flaw in Jenkins Audit Trail Plugin by CloudBees
CVE-2020-2288
5.3MEDIUM
Summary
The Jenkins Audit Trail Plugin version 3.6 and earlier is vulnerable to a bypass flaw that allows attackers to manipulate the URL by appending a suffix. This action causes the default regular expression pattern to be ignored during request handling, potentially exposing sensitive activities or logs that should be protected. Administrators should ensure they update to a patched version to mitigate risks associated with this vulnerability.
Affected Version(s)
Jenkins Audit Trail Plugin <= 3.6
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved