5.3
CVSSv3

CVE-2020-2287

Published: 08/10/2020 Updated: 25/10/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Jenkins Audit Trail Plugin 3.6 and previous versions applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows malicious users to craft URLs that bypass request logging of any target URL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins audit trail

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities in Jenkins plugins <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Beck &lt;ml () ...