{ "CVE_data_meta" : { "ASSIGNER" : "kurt@seifried.org", "DATE_ASSIGNED" : "2019-02-06T02:59:03.174428", "ID" : "CVE-2019-1003009", "REQUESTER" : "ml@beckweb.net", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Jenkins Active Directory Plugin", "version" : { "version_data" : [ { "version_value" : "2.10 and earlier" } ] } } ] }, "vendor_name" : "Jenkins project" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "CWE-295" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-859", "refsource" : "CONFIRM", "url" : "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-859" } ] } }