Vulnerabilities
Vulnerable Software
Atlassian:  >> Crowd  >> 3.0.3  Security Vulnerabilities
Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
CVSS Score
8.1
EPSS Score
0.002
Published
2019-02-13
The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1.
CVSS Score
6.8
EPSS Score
0.001
Published
2018-01-31


Contact Us

Shodan ® - All rights reserved