CVE-2022-23105:
User passwords transmitted in plain text by Jenkins Active Directory Plugin
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21541%
CWE
Published
1/13/2022
Updated
12/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:active-directory | maven | < 2.25.1 | 2.25.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing TLS enforcement in ADSI/LDAP connections. Key functions were identified by analyzing the patch diff:- The retrieveUser and loadGroupByGroupname functions used insecure ADS_READONLY_SERVER flags instead of TLS-enabled flags for ADSI connections.- The bind method in the security realm descriptor used non-encrypted LDAP by default unless explicitly configured otherwise via system properties.These functions handled authentication/authorization flows without mandatory encryption, matching CWE-319's cleartext transmission pattern. The patch introduced ADSI_FLAGS with TLS requirements and a new requireTLS configuration parameter to address this.