First published: Wed Nov 04 2020(Updated: )
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Directory | <=2.19 | |
maven/org.jenkins-ci.plugins:active-directory | <2.16.1 | 2.16.1 |
maven/org.jenkins-ci.plugins:active-directory | >=2.17<2.20 | 2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-2300 is critical with a severity value of 9.8.
The vulnerability allows an attacker to use an empty password in Active Directory Plugin versions prior to 2.20 and 2.16.1.
Jenkins Active Directory Plugin versions 2.19 and earlier are affected.
An attacker can potentially bypass authentication and gain unauthorized access to the Jenkins Active Directory Plugin.
To fix the vulnerability, upgrade to Active Directory Plugin version 2.20 or 2.16.1.