SAML Single Sign On Vulnerability in Atlassian Products
CVE-2019-13347

7.5HIGH

Key Information:

Vendor
Atlassian
Vendor
CVE Published:
13 December 2019

Summary

The SAML Single Sign On (SSO) plugin for various Atlassian products contains a vulnerability that permits locally disabled users to reactivate their accounts simply by accessing the instances of Jira, Confluence, Bitbucket, or Bamboo. This occurs even if the relevant configuration option designed to prevent this reactivation is disabled. For this exploitation to be successful, the attacker must possess valid authorization from the identity provider and the plugin's 'User Update Method' setting must be configured to 'Update from SAML Attributes'.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.