Description
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2055 | Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials. |
Github GHSA |
GHSA-g8c3-6fj2-87w7 | Jenkins Active Directory Plugin vulnerable to Active Directory credential disclosure |
References
History
Thu, 07 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-11-07T15:02:58.066Z
Reserved: 2023-07-11T09:47:04.493Z
Link: CVE-2023-37943
Updated: 2024-08-02T17:23:27.749Z
Status : Modified
Published: 2023-07-12T16:15:13.063
Modified: 2024-11-21T08:12:30.647
Link: CVE-2023-37943
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA