Session Expiration Vulnerability in Atlassian Crowd
CVE-2018-20238

8.1HIGH

Key Information:

Vendor
Atlassian
Status
Vendor
CVE Published:
13 February 2019

Summary

A vulnerability exists in various REST resources of Atlassian Crowd that allows remote attackers to bypass session expiration. This flaw enables them to authenticate using an expired user session, potentially leading to unauthorized access to sensitive resources. It is crucial for organizations using affected versions to apply security updates to mitigate this risk.

Affected Version(s)

Crowd < 3.2.7

Crowd 3.3.0

Crowd < 3.3.4

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.