CVE-2023-37943

medium

Description

Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.

References

https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059

http://www.openwall.com/lists/oss-security/2023/07/12/2

Details

Source: Mitre, NVD

Published: 2023-07-12

Updated: 2023-07-20

Risk Information

CVSS v2

Base Score: 5.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: Medium