Authentication Bypass in Jenkins Active Directory Plugin
CVE-2020-2301
9.8CRITICAL
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 4 November 2020
Summary
The Jenkins Active Directory Plugin prior to version 2.20 suffers from an authentication bypass flaw, enabling attackers to impersonate any user with any password, as long as the successful authentication of that user is still present in the cache during Windows/ADSI mode usage. This flaw presents significant security implications, allowing unauthorized access to user accounts and potentially compromising sensitive information.
Affected Version(s)
Jenkins Active Directory Plugin <= 2.19
Jenkins Active Directory Plugin 2.16.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved