5.9
CVE-2023-37943
- EPSS 0.02%
- Published 12.07.2023 16:15:13
- Last modified 21.11.2024 08:12:30
- Source jenkinsci-cert@googlegroups.co
- Teams watchlist Login
- Open Login
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Data is provided by the National Vulnerability Database (NVD)
Jenkins ≫ Active Directory SwPlatformjenkins Version <= 2.30
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.041 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-311 Missing Encryption of Sensitive Data
The product does not encrypt sensitive or critical information before storage or transmission.