Description
An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.
Remediation
References
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-859
Related Vulnerabilities
CVE-2020-2253 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2022-36903 Vulnerability in maven package org.jenkins-ci.plugins:repository-connector
CVE-2018-6873 Vulnerability in npm package auth0-js
CVE-2018-12536 Vulnerability in maven package org.eclipse.jetty:jetty-util
CVE-2023-43123 Vulnerability in maven package org.apache.storm:storm-server