Description
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/07/12/2
https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059
Related Vulnerabilities
CVE-2017-12617 Vulnerability in maven package org.apache.tomcat:tomcat-util
CVE-2022-36882 Vulnerability in maven package org.jenkins-ci.plugins:git
CVE-2019-17495 Vulnerability in maven package org.webjars.npm:swagger-ui
CVE-2020-36182 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2021-32769 Vulnerability in maven package io.micronaut:micronaut-core