Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/10/08/5 | Third Party Advisory |
Configurations
Information
Published : 2020-10-08 06:15
Updated : 2020-10-16 09:25
NVD link : CVE-2020-2287
Mitre link : CVE-2020-2287
JSON object : View
CWE
CWE-435
Improper Interaction Between Multiple Correctly-Behaving Entities
Products Affected
jenkins
- audit_trail