Miggo Logo

CVE-2020-2301:
Authentication cache in Active Directory Jenkins Plugin allows logging in with any password

9.8

CVSS Score

Basic Information

EPSS Score
-
Published
5/24/2022
Updated
12/14/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:active-directorymaven>= 2.17, < 2.202.20
org.jenkins-ci.plugins:active-directorymaven< 2.16.12.16.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper cache key construction in Windows/ADSI mode. The original implementation in ActiveDirectoryAuthenticationProvider.java's retrieveUser method used a username-only cache key (Cache<String, UserDetails>). This allowed cached authentication entries to be reused regardless of the provided password. The commit introduced CacheKey (with username + password hash) and modified the cache to use it, confirming the flaw was in the cache key handling during authentication checks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins **tiv* *ir**tory Plu*in impl*m*nts two s*p*r*t* mo**s: Int**r*tion wit* **SI on Win*ows, *n* *n OS **nosti* L**P-**s** mo**. Option*lly, to r**u** lookup tim*, * ***** **n ** *on*i*ur** to r*m*m**r us*r lookups *n* us*r *ut**nti**tions. In *

Reasoning

T** vuln*r**ility st*mm** *rom improp*r ***** k*y *onstru*tion in Win*ows/**SI mo**. T** ori*in*l impl*m*nt*tion in **tiv**ir**tory*ut**nti**tionProvi**r.j*v*'s r*tri*v*Us*r m*t*o* us** * us*rn*m*-only ***** k*y (*****<Strin*, Us*r**t*ils>). T*is *ll