Bypass Flaw in Jenkins Audit Trail Plugin by CloudBees
CVE-2020-2288

5.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
8 October 2020

Summary

The Jenkins Audit Trail Plugin version 3.6 and earlier is vulnerable to a bypass flaw that allows attackers to manipulate the URL by appending a suffix. This action causes the default regular expression pattern to be ignored during request handling, potentially exposing sensitive activities or logs that should be protected. Administrators should ensure they update to a patched version to mitigate risks associated with this vulnerability.

Affected Version(s)

Jenkins Audit Trail Plugin <= 3.6

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.