Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2055 | Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials. |
Github GHSA |
GHSA-g8c3-6fj2-87w7 | Jenkins Active Directory Plugin vulnerable to Active Directory credential disclosure |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-11-07T15:02:58.066Z
Reserved: 2023-07-11T09:47:04.493Z
Link: CVE-2023-37943
Updated: 2024-08-02T17:23:27.749Z
Status : Modified
Published: 2023-07-12T16:15:13.063
Modified: 2024-11-21T08:12:30.647
Link: CVE-2023-37943
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA