First published: Wed Feb 06 2019(Updated: )
An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Directory | <=2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1003009 is high with a score of 7.4.
Jenkins Active Directory Plugin versions up to and including 2.10 are affected by CVE-2019-1003009.
CVE-2019-1003009 is associated with CWE category 295.
To fix CVE-2019-1003009, users should update to a version of Jenkins Active Directory Plugin that is higher than 2.10.
You can find more information about CVE-2019-1003009 at the following URL: https://jenkins.io/security/advisory/2019-01-28/#SECURITY-859