Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXJwajYtMnE4ci05OGY4
Request logging bypass in Jenkins Audit Trail Plugin
Audit Trail Plugin logs requests whose URL path matches an admin-configured regular expression.\n\nA discrepancy between the behavior of the plugin and the Stapler web framework in parsing URL paths allows attackers to craft URLs that would bypass request logging in Audit Trail Plugin 3.6 and earlier. This only applies to Jenkins 2.227 and earlier, LTS 2.204.5 and earlier, as the fix for SECURITY-1774 prohibits dispatch of affected requests.\n\nAudit Trail Plugin 3.7 processes request URL paths the same way as the Stapler web framework.
Permalink: https://github.com/advisories/GHSA-rpj6-2q8r-98f8JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXJwajYtMnE4ci05OGY4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: 8 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-rpj6-2q8r-98f8, CVE-2020-2287
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2287
- https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815
- http://www.openwall.com/lists/oss-security/2020/10/08/5
- https://github.com/advisories/GHSA-rpj6-2q8r-98f8
Affected Packages
maven:org.jenkins-ci.plugins:audit-trail
Versions: < 3.7Fixed in: 3.7