Session Expiration Vulnerability in Atlassian Crowd
CVE-2018-20238
8.1HIGH
Summary
A vulnerability exists in various REST resources of Atlassian Crowd that allows remote attackers to bypass session expiration. This flaw enables them to authenticate using an expired user session, potentially leading to unauthorized access to sensitive resources. It is crucial for organizations using affected versions to apply security updates to mitigate this risk.
Affected Version(s)
Crowd < 3.2.7
Crowd 3.3.0
Crowd < 3.3.4
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved