Improper Authentication Limitations in Atlassian Fisheye and Crucible
CVE-2021-43958
9.8CRITICAL
Summary
In versions prior to 4.8.9 of Atlassian Fisheye and Crucible, various REST resources did not enforce limits on failed login attempts. This flaw allows remote attackers to exploit the system by repeatedly attempting to guess user credentials without hitting a maximum threshold. As a result, attackers could bypass expected security measures, such as CAPTCHA challenges that are intended to prevent automated access. Organizations using these applications are advised to update to the latest versions to mitigate the risk of unauthorized access.
Affected Version(s)
Crucible < 4.8.9
Fisheye < 4.8.9
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved