CVE-2023-37943
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2023-37943. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Available Exploits
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Jenkins Active Directory Plugin vulnerable to Active Directory credential disclosure
GHSA-g8c3-6fj2-87w7Advisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: July 12, 2023, Modified: July 20, 2023