Description
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3251 | Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server. |
Github GHSA |
GHSA-8wcw-cw2f-h4g2 | Improper Authentication (empty password) in Jenkins Active Directory Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T07:09:53.284Z
Reserved: 2019-12-05T00:00:00.000Z
Link: CVE-2020-2300
No data.
Status : Modified
Published: 2020-11-04T15:15:11.067
Modified: 2024-11-21T05:25:15.003
Link: CVE-2020-2300
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD
Github GHSA