Описание
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Ссылки
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.30 (включая)
cpe:2.3:a:jenkins:active_directory:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 8%
0.00029
Низкий
5.9 Medium
CVSS3
Дефекты
CWE-311
Связанные уязвимости
CVSS3: 5.9
github
больше 2 лет назад
Jenkins Active Directory Plugin vulnerable to Active Directory credential disclosure
EPSS
Процентиль: 8%
0.00029
Низкий
5.9 Medium
CVSS3
Дефекты
CWE-311