Bypassing Default Regular Expression Pattern in Jenkins Audit Trail Plugin

Bypassing Default Regular Expression Pattern in Jenkins Audit Trail Plugin

CVE-2020-2288 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.

Learn more about our Web Application Penetration Testing UK.