Description
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/07/12/2
https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059
Related Vulnerabilities
CVE-2018-11799 Vulnerability in maven package org.apache.oozie:oozie-core
CVE-2021-23337 Vulnerability in npm package lodash
CVE-2019-8331 Vulnerability in maven package org.fujion.webjars:bootstrap
CVE-2021-25329 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2019-17558 Vulnerability in maven package org.apache.solr:solr-velocity