Description
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Remediation
References
http://www.openwall.com/lists/oss-security/2020/10/08/5
https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1846
Related Vulnerabilities
CVE-2022-29256 Vulnerability in npm package sharp
CVE-2019-16777 Vulnerability in npm package npm
CVE-2022-36904 Vulnerability in maven package org.jenkins-ci.plugins:repository-connector
CVE-2022-27772 Vulnerability in maven package org.springframework.boot:spring-boot
CVE-2021-28164 Vulnerability in maven package org.eclipse.jetty:jetty-webapp