Loading HuntDB...

GHSA-8wcw-cw2f-h4g2

GitHub Security Advisory

Improper Authentication (empty password) in Jenkins Active Directory Plugin

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

Jenkins Active Directory Plugin implements two separate modes: Integration with ADSI on Windows, and an OS agnostic LDAP-based mode.

The Windows/ADSI mode does not specifically prohibit use of empty passwords in Active Directory Plugin prior to 2.20 and 2.16.1. If the Active Directory server allows the unauthenticated bind operation, this allows attackers to log in to Jenkins as any user by providing an empty password.

Jenkins Active Directory Plugin 2.20 and 2.16.1 prohibits the use of an empty password to log in.

Affected Packages

Maven org.jenkins-ci.plugins:active-directory
Affected versions: 2.17 (fixed in 2.20)
Maven org.jenkins-ci.plugins:active-directory
Affected versions: 0 (fixed in 2.16.1)

Related CVEs

Key Information

GHSA ID
GHSA-8wcw-cw2f-h4g2
Published
May 24, 2022 5:33 PM
Last Modified
October 27, 2023 12:02 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:active-directory
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.