Session Fixation Vulnerability in Atlassian Crowd Affected by Cookie Management Issues
CVE-2017-18105
8.1HIGH
Summary
A session fixation vulnerability exists in Atlassian Crowd which allows remote attackers to exploit the system by utilizing a user's JSESSIONID cookie. This vulnerability can lead to unauthorized access to internal and third-party REST resources, potentially compromising sensitive data and user sessions. Attackers must first gain access to a legitimate user's cookie to exploit this flaw, thereby emphasizing the importance of robust session management practices.
Affected Version(s)
Crowd < 3.0.2
Crowd 3.1.0
Crowd < 3.1.1
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved