In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2288
Reference (s):
- https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1846
- URL: https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1846
- MLIST:[oss-security] 20201008 Multiple vulnerabilities in Jenkins plugins
- URL: http://www.openwall.com/lists/oss-security/2020/10/08/5