{"id":"CVE-2020-2300","details":"Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.","aliases":["GHSA-8wcw-cw2f-h4g2"],"modified":"2026-03-14T10:06:39.965836Z","published":"2020-11-04T15:15:11.067Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/11/04/6"},{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2099"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/active-directory-plugin","events":[{"introduced":"0"},{"last_affected":"6235df351f09b46a33f96a332945f0518c7d27e0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.19"}]}}],"versions":["active-directory-1.19","active-directory-1.20","active-directory-1.21","active-directory-1.22","active-directory-1.23","active-directory-1.24","active-directory-1.25","active-directory-1.26","active-directory-1.27","active-directory-1.28","active-directory-1.29","active-directory-1.30","active-directory-1.31","active-directory-1.32","active-directory-1.33","active-directory-1.34","active-directory-1.35","active-directory-1.36","active-directory-1.37","active-directory-1.38","active-directory-1.39","active-directory-1.40","active-directory-1.41","active-directory-1.42","active-directory-1.43","active-directory-1.44","active-directory-1.45","active-directory-1.46","active-directory-1.47","active-directory-1.48","active-directory-1.49","active-directory-2.0","active-directory-2.1","active-directory-2.10","active-directory-2.11","active-directory-2.12","active-directory-2.13","active-directory-2.14","active-directory-2.15","active-directory-2.16","active-directory-2.17","active-directory-2.18","active-directory-2.19","active-directory-2.2","active-directory-2.3","active-directory-2.4","active-directory-2.5","active-directory-2.6","active-directory-2.7","active-directory-2.8","active-directory-2.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2300.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}