Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jOGNjLWhqNTctdm02Nc0ijg
User passwords transmitted in plain text by Jenkins Active Directory Plugin
Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations.
Permalink: https://github.com/advisories/GHSA-c8cc-hj57-vm65JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jOGNjLWhqNTctdm02Nc0ijg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 4 months ago
CVSS Score: 4.8
CVSS vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Identifiers: GHSA-c8cc-hj57-vm65, CVE-2022-23105
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-23105
- https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1389
- http://www.openwall.com/lists/oss-security/2022/01/12/6
- https://github.com/jenkinsci/active-directory-plugin/commit/07b05f83b167c79590f2efbdad8cb84fc98ed150
- https://github.com/advisories/GHSA-c8cc-hj57-vm65
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:active-directory
Affected Version Ranges: < 2.25.1Fixed in: 2.25.1