CVE-2023-37943
Summary
| CVE | CVE-2023-37943 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-12 16:15:00 UTC |
| Updated | 2023-07-20 01:46:00 UTC |
| Description | Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials. |
Risk And Classification
Problem Types: CWE-311
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Jenkins | Active Directory | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Jenkins Security Advisory 2023-07-12 | MISC | www.jenkins.io | |
| oss-security - Multiple vulnerabilities in Jenkins plugins | MISC | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.