Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-2287


Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.


Published

2020-10-08T13:15:11.407

Last Modified

2024-11-21T05:25:12.613

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses

-


Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application jenkins audit_trail ≤ 3.6 Yes

References