CVE-2020-2301:
Authentication cache in Active Directory Jenkins Plugin allows logging in with any password
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/24/2022
Updated
12/14/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:active-directory | maven | >= 2.17, < 2.20 | 2.20 |
org.jenkins-ci.plugins:active-directory | maven | < 2.16.1 | 2.16.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper cache key construction in Windows/ADSI mode. The original implementation in ActiveDirectoryAuthenticationProvider.java's retrieveUser method used a username-only cache key (Cache<String, UserDetails>). This allowed cached authentication entries to be reused regardless of the provided password. The commit introduced CacheKey (with username + password hash) and modified the cache to use it, confirming the flaw was in the cache key handling during authentication checks.