First published: Wed Nov 04 2020(Updated: )
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Directory | <=2.19 | |
maven/org.jenkins-ci.plugins:active-directory | <2.16.1 | 2.16.1 |
maven/org.jenkins-ci.plugins:active-directory | >=2.17<2.20 | 2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2301 is a vulnerability in the Active Directory Plugin for Jenkins that allows attackers to log in as any user.
The severity of CVE-2020-2301 is critical with a CVSS score of 9.8.
CVE-2020-2301 affects Jenkins Active Directory Plugin versions 2.19 and earlier.
An attacker can exploit CVE-2020-2301 by logging in as any user with any password.
Yes, the fix for CVE-2020-2301 is available in versions 2.20 and above of the Active Directory Plugin.