Cross-Site Request Forgery Vulnerability in Jenkins Active Directory Plugin
CVE-2020-2303
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 4 November 2020
Summary
The Jenkins Active Directory Plugin before version 2.20 is prone to a Cross-Site Request Forgery vulnerability, allowing attackers to execute connection tests to Active Directory servers with arbitrary credentials. This vulnerability could enable attackers to exploit the system by connecting to attacker-specified or previously-configured Active Directory servers. Security measures should be implemented to mitigate this risk.
Affected Version(s)
Jenkins Active Directory Plugin <= 2.19
Jenkins Active Directory Plugin 2.16.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved