Jenkins Project Jenkins Active Directory Plugin vulnerabilities

8 known vulnerabilities affecting jenkins_project/jenkins_active_directory_plugin.

Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH1MEDIUM4

Vulnerabilities

Page 1 of 1
CVE-2023-37943MEDIUMCVSS 5.9≤ 2.302023-07-12
CVE-2023-37943 [MEDIUM] CWE-311 CVE-2023-37943: Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options an Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
cvelistv5nvd
CVE-2022-23105MEDIUMCVSS 6.5≥ unspecified, ≤ 2.252022-01-12
CVE-2022-23105 [MEDIUM] CWE-319 CVE-2022-23105: Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between t Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations.
cvelistv5nvd
CVE-2020-2300CRITICALCVSS 9.8≥ unspecified, ≤ 2.192020-11-04
CVE-2020-2300 [CRITICAL] CVE-2020-2300: Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in W Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
cvelistv5nvd
CVE-2020-2301CRITICALCVSS 9.8≥ unspecified, ≤ 2.192020-11-04
CVE-2020-2301 [CRITICAL] CVE-2020-2301: Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any pas Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
cvelistv5nvd
CVE-2020-2299CRITICALCVSS 9.8≥ 1.44, < unspecified≥ unspecified, ≤ 2.192020-11-04
CVE-2020-2299 [CRITICAL] CVE-2020-2299: Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic c Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
cvelistv5nvd
CVE-2020-2303MEDIUMCVSS 4.3≥ unspecified, ≤ 2.192020-11-04
CVE-2020-2303 [MEDIUM] CWE-352 CVE-2020-2303: A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlie A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials.
cvelistv5nvd
CVE-2020-2302MEDIUMCVSS 4.3≥ unspecified, ≤ 2.192020-11-04
CVE-2020-2302 [MEDIUM] CWE-862 CVE-2020-2302: A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page.
cvelistv5nvd
CVE-2019-1003009HIGHCVSS 7.4v2.10 and earlier2019-02-06
CVE-2019-1003009 [HIGH] CWE-295 CVE-2019-1003009: An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvi
cvelistv5nvd