Description
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
Remediation
References
https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059
http://www.openwall.com/lists/oss-security/2023/07/12/2
Related Vulnerabilities
CVE-2022-25895 Vulnerability in npm package lite-dev-server
CVE-2021-25642 Vulnerability in maven package org.apache.hadoop:hadoop-yarn-server-resourcemanager
CVE-2022-34784 Vulnerability in maven package org.jenkins-ci.plugins:build-metrics
CVE-2021-21655 Vulnerability in maven package org.jenkins-ci.plugins:p4
CVE-2022-28731 Vulnerability in maven package org.apache.jspwiki:jspwiki-war