First published: Wed Jul 12 2023(Updated: )
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Active Directory | <=2.30 | |
<=2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-37943.
The severity of CVE-2023-37943 is medium.
The affected software is Jenkins Active Directory Plugin version 2.30 and earlier.
To fix CVE-2023-37943, upgrade Jenkins Active Directory Plugin to version 2.30.1 or later.
You can find more information about CVE-2023-37943 in the advisory from Jenkins, the OSS Security mailing list, and the NIST National Vulnerability Database.