Bypassing Default Regular Expression Pattern in Jenkins Audit Trail Plugin
CVE-2020-2288 · MEDIUM Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Learn more about our Web Application Penetration Testing UK.