CVE-2020-2300Improper Authentication in Project Jenkins Active Directory Plugin

Severity
9.8CRITICALNVD
EPSS
0.2%
top 58.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateMay 24

Description

Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
Improper Authentication (empty password) in Jenkins Active Directory Plugin2022-05-24
OSV
Improper Authentication (empty password) in Jenkins Active Directory Plugin2022-05-24
CVEList
CVE-2020-2300: Jenkins Active Directory Plugin 22020-11-04

💥Exploits & PoCs

1
Exploit-DB
Cayin Signage Media Player 3.0 - Remote Command Injection (root)2020-06-04

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2020-11-042020-11-04
CVE-2020-2300 — Improper Authentication | cvebase