GHSA-rpj6-2q8r-98f8

Suggest an improvement
Source
https://github.com/advisories/GHSA-rpj6-2q8r-98f8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-rpj6-2q8r-98f8/GHSA-rpj6-2q8r-98f8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rpj6-2q8r-98f8
Aliases
Published
2022-02-10T20:29:39Z
Modified
2024-02-16T08:21:13.385802Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Request logging bypass in Jenkins Audit Trail Plugin
Details

Audit Trail Plugin logs requests whose URL path matches an admin-configured regular expression.

A discrepancy between the behavior of the plugin and the Stapler web framework in parsing URL paths allows attackers to craft URLs that would bypass request logging in Audit Trail Plugin 3.6 and earlier. This only applies to Jenkins 2.227 and earlier, LTS 2.204.5 and earlier, as the fix for SECURITY-1774 prohibits dispatch of affected requests.

Audit Trail Plugin 3.7 processes request URL paths the same way as the Stapler web framework.

References

Affected packages

Maven / org.jenkins-ci.plugins:audit-trail

Package

Name
org.jenkins-ci.plugins:audit-trail
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/audit-trail

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7

Affected versions

1.*

1.5
1.6
1.7
1.8

2.*

2.0
2.1
2.2
2.3
2.4
2.5
2.6

3.*

3.0
3.1
3.2
3.3
3.4
3.5
3.6