Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2055 | Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials. |
Github GHSA |
GHSA-g8c3-6fj2-87w7 | Jenkins Active Directory Plugin vulnerable to Active Directory credential disclosure |
Thu, 07 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-11-07T15:02:58.066Z
Reserved: 2023-07-11T09:47:04.493Z
Link: CVE-2023-37943
Updated: 2024-08-02T17:23:27.749Z
Status : Modified
Published: 2023-07-12T16:15:13.063
Modified: 2024-11-21T08:12:30.647
Link: CVE-2023-37943
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA