Security Misconfiguration Vulnerability in Atlassian Crowd
CVE-2022-43782
9.8CRITICAL
Key Information:
- Vendor
- Atlassian
- Vendor
- CVE Published:
- 17 November 2022
Summary
A vulnerability in Atlassian Crowd allows attackers to authenticate as the application due to security misconfiguration. Exploitation can occur through the ability to invoke privileged endpoints in Crowd's REST API, specifically under the {{usermanagement}} path. This vulnerability is limited to IPs specified in the application's allowlist, which is empty by default, exposing all users to potential unauthorized access. Affected versions include all versions from 3.x.x, 4.x.x prior to 4.4.4, and 5.x.x before 5.0.3.
Affected Version(s)
Crowd Data Center before 4.4.4
Crowd Data Center before 5.0.3
Crowd Server before 4.4.4
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Ashish Kotha