Authentication Flaw in Jenkins Active Directory Plugin by Jenkins
CVE-2020-2300
9.8CRITICAL
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 4 November 2020
Summary
The Jenkins Active Directory Plugin prior to version 2.19 is susceptible to an authentication bypass due to its failure to enforce restrictions on empty passwords in Windows/ADSI mode. This flaw enables attackers to potentially log in to the Jenkins server impersonating any user, contingent upon the configuration of the connected Active Directory server. Organizations utilizing this plugin should ensure they update to the latest version to mitigate associated risks.
Affected Version(s)
Jenkins Active Directory Plugin <= 2.19
Jenkins Active Directory Plugin 2.16.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved