Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rpj6-2q8r-98f8

Опубликовано: 10 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Request logging bypass in Jenkins Audit Trail Plugin

Audit Trail Plugin logs requests whose URL path matches an admin-configured regular expression.

A discrepancy between the behavior of the plugin and the Stapler web framework in parsing URL paths allows attackers to craft URLs that would bypass request logging in Audit Trail Plugin 3.6 and earlier. This only applies to Jenkins 2.227 and earlier, LTS 2.204.5 and earlier, as the fix for SECURITY-1774 prohibits dispatch of affected requests.

Audit Trail Plugin 3.7 processes request URL paths the same way as the Stapler web framework.

Пакеты

Наименование

org.jenkins-ci.plugins:audit-trail

maven
Затронутые версииВерсия исправления

< 3.7

3.7

EPSS

Процентиль: 21%
0.00066
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-435

Связанные уязвимости

CVSS3: 5.3
nvd
больше 5 лет назад

Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.

EPSS

Процентиль: 21%
0.00066
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-435