Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default.
The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/CWD-5888 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 03:54
Type | Values Removed | Values Added |
---|---|---|
Summary | Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3 |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
18 Nov 2022, 18:51
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://jira.atlassian.com/browse/CWD-5888 - Issue Tracking, Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-287 | |
First Time |
Atlassian
Atlassian crowd |
|
CPE | cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:* |
17 Nov 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-17 00:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-43782
Mitre link : CVE-2022-43782
CVE.ORG link : CVE-2022-43782
JSON object : View
Products Affected
atlassian
- crowd
CWE