Vulnerability Details CVE-2020-2288
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 23.1%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2020-2288
-
cpe:2.3:a:jenkins:audit_trail:-
-
cpe:2.3:a:jenkins:audit_trail:1.0
-
cpe:2.3:a:jenkins:audit_trail:1.1
-
cpe:2.3:a:jenkins:audit_trail:1.2
-
cpe:2.3:a:jenkins:audit_trail:1.3
-
cpe:2.3:a:jenkins:audit_trail:1.4
-
cpe:2.3:a:jenkins:audit_trail:1.5
-
cpe:2.3:a:jenkins:audit_trail:1.6
-
cpe:2.3:a:jenkins:audit_trail:1.7
-
cpe:2.3:a:jenkins:audit_trail:1.8
-
cpe:2.3:a:jenkins:audit_trail:2.0
-
cpe:2.3:a:jenkins:audit_trail:2.1
-
cpe:2.3:a:jenkins:audit_trail:2.2
-
cpe:2.3:a:jenkins:audit_trail:2.3
-
cpe:2.3:a:jenkins:audit_trail:2.4
-
cpe:2.3:a:jenkins:audit_trail:2.5
-
cpe:2.3:a:jenkins:audit_trail:2.6
-
cpe:2.3:a:jenkins:audit_trail:3.0
-
cpe:2.3:a:jenkins:audit_trail:3.1
-
cpe:2.3:a:jenkins:audit_trail:3.2
-
cpe:2.3:a:jenkins:audit_trail:3.3
-
cpe:2.3:a:jenkins:audit_trail:3.4
-
cpe:2.3:a:jenkins:audit_trail:3.5
-
cpe:2.3:a:jenkins:audit_trail:3.6