Maven package
org.jenkins-ci.plugins/active-directory
pkg:maven/org.jenkins-ci.plugins/active-directory
Vulnerabilities (9)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-37943 | — | < 2.30.1 | 2.30.1 | Jul 12, 2023 | Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory server | ||
| CVE-2022-23105 | — | < 2.25.1 | 2.25.1 | Jan 12, 2022 | Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations. | ||
| CVE-2020-2303 | — | < 2.20 | 2.20 | Nov 4, 2020 | A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials. | ||
| CVE-2020-2302 | — | < 2.20 | 2.20 | Nov 4, 2020 | A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page. | ||
| CVE-2020-2301 | — | >= 2.17, < 2.20 | 2.20 | Nov 4, 2020 | Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode. | ||
| CVE-2020-2300 | — | >= 2.17, < 2.20 | 2.20 | Nov 4, 2020 | Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server. | ||
| CVE-2020-2299 | — | >= 2.17, < 2.20 | 2.20 | Nov 4, 2020 | Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password. | ||
| CVE-2019-1003009 | — | < 2.11 | 2.11 | Feb 6, 2019 | An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/ | ||
| CVE-2017-2649 | — | < 2.3 | 2.3 | Jul 27, 2018 | It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks. |
- CVE-2023-37943Jul 12, 2023affected < 2.30.1fixed 2.30.1
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory server
- CVE-2022-23105Jan 12, 2022affected < 2.25.1fixed 2.25.1
Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations.
- CVE-2020-2303Nov 4, 2020affected < 2.20fixed 2.20
A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials.
- CVE-2020-2302Nov 4, 2020affected < 2.20fixed 2.20
A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page.
- CVE-2020-2301Nov 4, 2020affected >= 2.17, < 2.20fixed 2.20
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
- CVE-2020-2300Nov 4, 2020affected >= 2.17, < 2.20fixed 2.20
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
- CVE-2020-2299Nov 4, 2020affected >= 2.17, < 2.20fixed 2.20
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
- CVE-2019-1003009Feb 6, 2019affected < 2.11fixed 2.11
An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/
- CVE-2017-2649Jul 27, 2018affected < 2.3fixed 2.3
It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks.