{"api_version":"1","generated_at":"2026-04-22T17:47:48+00:00","cve":"CVE-2023-37943","urls":{"html":"https://cve.report/CVE-2023-37943","api":"https://cve.report/api/cve/CVE-2023-37943.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-37943","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-37943"},"summary":{"title":"CVE-2023-37943","description":"Jenkins Active Directory Plugin 2.30 and earlier ignores the \"Require TLS\" and \"StartTls\" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.","state":"PUBLIC","assigner":"jenkinsci-cert@googlegroups.com","published_at":"2023-07-12 16:15:00","updated_at":"2023-07-20 01:46:00"},"problem_types":["CWE-311"],"metrics":[],"references":[{"url":"https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059","name":"https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059","refsource":"MISC","tags":[],"title":"Jenkins Security Advisory 2023-07-12","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/12/2","name":"http://www.openwall.com/lists/oss-security/2023/07/12/2","refsource":"MISC","tags":[],"title":"oss-security - Multiple vulnerabilities in Jenkins plugins","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-37943","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37943","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"37943","vulnerable":"1","versionEndIncluding":"2.30","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"active_directory","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-37943","ASSIGNER":"jenkinsci-cert@googlegroups.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Jenkins Active Directory Plugin 2.30 and earlier ignores the \"Require TLS\" and \"StartTls\" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Jenkins Project","product":{"product_data":[{"product_name":"Jenkins Active Directory Plugin","version":{"version_data":[{"version_affected":"<=","version_name":"0","version_value":"2.30"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059","refsource":"MISC","name":"https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/12/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/07/12/2"}]}},"nvd":{"publishedDate":"2023-07-12 16:15:00","lastModifiedDate":"2023-07-20 01:46:00","problem_types":["CWE-311"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:active_directory:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"2.30","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}