Improper Authentication in Jenkins Active Directory Plugin
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 14, 2023
Package
Affected versions
>= 2.17, < 2.20
>= 1.44, < 2.16.1
Patched versions
2.20
2.16.1
Description
Published by the National Vulnerability Database
Nov 4, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Sep 7, 2022
Last updated
Dec 14, 2023
Jenkins Active Directory Plugin implements two separate modes: Integration with ADSI on Windows, and an OS agnostic LDAP-based mode.
The LDAP-based mode in Active Directory Plugin starting in version 1.44 and prior to versions 2.16.1 and 2.20 shares code between user lookup and user authentication and distinguishes these behaviors through the use if a magic constant used in place of a real password. This allows attackers to log in as any user if the magic constant is used as the password in Active Directory Plugin prior to 2.16.1 and 220.
Active Directory Plugin 2.16.1 and 2.20 no longer uses a magic constant to distinguish between user lookup and user authentication.
References