Description
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/10/08/5
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1846
Related Vulnerabilities
CVE-2015-2912 Vulnerability in maven package com.orientechnologies:orientdb-core
CVE-2022-41940 Vulnerability in maven package org.webjars.npm:engine.io
CVE-2017-12963 Vulnerability in npm package node-sass
CVE-2017-5635 Vulnerability in maven package org.apache.nifi:nifi-web-security
CVE-2014-7810 Vulnerability in maven package org.apache.tomcat:jasper