Description
An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1989 | An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS. |
Github GHSA |
GHSA-2h95-4xw9-m68j | Jenkins Active Directory Plugin Improper certificate validation with StartTLS |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-16T18:08:16.833Z
Reserved: 2019-02-06T00:00:00.000Z
Link: CVE-2019-1003009
No data.
Status : Modified
Published: 2019-02-06T16:29:00.530
Modified: 2024-11-21T04:17:43.940
Link: CVE-2019-1003009
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA