Lucene search

K
atlassianPpetrowskiCWD-5009
HistoryDec 12, 2017 - 8:33 a.m.

REST endpoint user impersonation using authentication module functionality - CVE-2017-16858

2017-12-1208:33:37
ppetrowski
jira.atlassian.com
10

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

26.9%

The ‘crowd-application’ plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1.

Affected versions:

  • All versions of Crowd from 1.5.0 to 3.1.1

Fix

Risk mitigation

  • This issue can be mitigated by ensuring that applications created by plugins using the ‘crowd-application’ plugin module (notably the google-apps application) have a consistent directory order with the Crowd application or that no such applications are defined in Crowd

Affected configurations

Vulners
Node
atlassiancrowdRange1.5
OR
atlassiancrowdRange2.9.1
OR
atlassiancrowdRange2.10.1
OR
atlassiancrowdRange2.11.0
OR
atlassiancrowdRange2.12.0
OR
atlassiancrowdRange3.0.0
OR
atlassiancrowdRange3.1.1
OR
atlassiancrowdRange<3.1.2
OR
atlassiancrowdRange<3.2.0
VendorProductVersionCPE
atlassiancrowd*cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

26.9%