First published: Wed Nov 04 2020(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Directory | <=2.19 | |
maven/org.jenkins-ci.plugins:active-directory | <2.20 | 2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2303 is a cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier.
The severity of CVE-2020-2303 is medium, with a CVSS score of 4.3.
CVE-2020-2303 affects Jenkins Active Directory Plugin 2.19 and earlier by allowing CSRF attacks through multiple HTTP endpoints.
An attacker can exploit CVE-2020-2303 by performing connection tests and connecting to unauthorized resources.
To mitigate CVE-2020-2303, upgrade Jenkins Active Directory Plugin to version 2.20 or later.