[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115532

 
 

909

 
 

90034

 
 

140

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2017-16858Date: (C)2018-02-07   (M)2018-02-28


The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 6.8CVSS Score : 4.9
Exploit Score: 1.6Exploit Score: 6.8
Impact Score: 5.2Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: SINGLE_INSTANCE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: NONE
Integrity: HIGH 
Availability: NONE 
  
Reference:
https://jira.atlassian.com/browse/CWD-5009

CPE    48
cpe:/a:atlassian:crowd:2.9.0
cpe:/a:atlassian:crowd:2.9.1
cpe:/a:atlassian:crowd:2.8.4
cpe:/a:atlassian:crowd:2.6.0
...
CWE    1
CWE-287

© SecPod Technologies