GHSA-7v9p-34r2-q668

Suggest an improvement
Source
https://github.com/advisories/GHSA-7v9p-34r2-q668
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7v9p-34r2-q668/GHSA-7v9p-34r2-q668.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7v9p-34r2-q668
Aliases
Published
2022-05-24T17:30:18Z
Modified
2024-02-16T08:31:20.923665Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Incorrect default pattern in Jenkins Audit Trail Plugin
Details

Jenkins Audit Trail Plugin uses regular expressions to match requested URLs whose dispatch should be logged.

In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.

Jenkins Audit Trail Plugin 3.7 changes the default regular expression pattern so that it allows for arbitrary suffixes. It automatically will replace previous default patterns with the new, more complete default pattern.

Additionally, an administrative monitor is shown if a user-specified pattern is found to be bypassable through crafted URLs and form validation was improved to recognize patterns that would not match requests with arbitrary suffixes.

Database specific
{
    "nvd_published_at": "2020-10-08T13:15:00Z",
    "cwe_ids": [
        "CWE-185"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-21T16:49:28Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:audit-trail

Package

Name
org.jenkins-ci.plugins:audit-trail
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/audit-trail

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7

Affected versions

1.*

1.5
1.6
1.7
1.8

2.*

2.0
2.1
2.2
2.3
2.4
2.5
2.6

3.*

3.0
3.1
3.2
3.3
3.4
3.5
3.6