Description
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/10/08/5
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1846
Related Vulnerabilities
CVE-2016-5398 Vulnerability in maven package org.jbpm:jbpm-designer-client
CVE-2017-7669 Vulnerability in maven package org.apache.hadoop:hadoop-common
CVE-2017-12617 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2017-16092 Vulnerability in npm package sencisho
CVE-2015-6524 Vulnerability in maven package org.apache.activemq:activemq-osgi