Jenkins Active Directory Plugin Vulnerability: Unencrypted Connection Allows Credential Theft

Jenkins Active Directory Plugin Vulnerability: Unencrypted Connection Allows Credential Theft

CVE-2023-37943 · MEDIUM Severity

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.

Learn more about our Cis Benchmark Audit For Server Software.