SAML Single Sign On Vulnerability in Atlassian Products
CVE-2019-13347
7.5HIGH
Summary
The SAML Single Sign On (SSO) plugin for various Atlassian products contains a vulnerability that permits locally disabled users to reactivate their accounts simply by accessing the instances of Jira, Confluence, Bitbucket, or Bamboo. This occurs even if the relevant configuration option designed to prevent this reactivation is disabled. For this exploitation to be successful, the attacker must possess valid authorization from the identity provider and the plugin's 'User Update Method' setting must be configured to 'Update from SAML Attributes'.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved