Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2020/10/08/5 | Third Party Advisory |
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-10-08 13:15
Updated : 2023-10-25 18:16
NVD link : CVE-2020-2287
Mitre link : CVE-2020-2287
CVE.ORG link : CVE-2020-2287
JSON object : View
Products Affected
jenkins
- audit_trail
CWE
No CWE.