Lucene search

K
atlassianSecurity-metrics-botCWD-5888
HistoryOct 27, 2022 - 12:45 a.m.

Crowd DC Critical Security Misconfiguration Vulnerability - CVE-2022-43782

2022-10-2700:45:02
security-metrics-bot
jira.atlassian.com
29
atlassian crowd
security misconfiguration
cve-2022-43782
rest api
ip allowlist
remote addresses
version 3.x.x
version 4.x.x
version 5.x.x
fixed version
mitigation
password change
advisory

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

56.0%

Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and call privileged endpoints in Crowd’s REST API under the {{usermanagement}}Β path.

This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is none by default.

The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3

Affected versions:

  • 3.x.x
  • 4.x.x < 4.4.4
  • 5.x.x < 5.0.3

Fixed versions:

  • 4.4.4
  • 5.0.3
  • 5.1.0

Mitigation/Workaround:

To remediate this vulnerability, update each affected product installation to a fixed version listed above.

If you’re unable to upgrade Crowd, a temporary mitigation is to remove or validate any Remote Addresses for {{crowd}} application in the Crowd product. You can navigate to the Remote Address configuration by following the document [here|https://confluence.atlassian.com/crowd/specifying-an-application-s-address-or-hostname-25788433.html], and remove any remote addresses accordingly.

Additionally, change password for the {{crowd}} application to a strong password especially if a remote address is necessary.

For additional details, please see full advisory here: [https://confluence.atlassian.com/x/UXurRQ]

Affected configurations

Vulners
Node
atlassiancrowdRange≀3.0.0
OR
atlassiancrowdRange≀3.0.1
OR
atlassiancrowdRange≀3.0.2
OR
atlassiancrowdRange≀3.0.3
OR
atlassiancrowdRange≀3.0.5
OR
atlassiancrowdRange≀3.1.1
OR
atlassiancrowdRange≀3.1.2
OR
atlassiancrowdRange≀3.1.3
OR
atlassiancrowdRange≀3.1.4
OR
atlassiancrowdRange≀3.2.0
OR
atlassiancrowdRange≀3.2.1
OR
atlassiancrowdRange≀3.2.2
OR
atlassiancrowdRange≀3.2.3
OR
atlassiancrowdRange≀3.3.0
OR
atlassiancrowdRange≀3.1.5
OR
atlassiancrowdRange≀3.1.6
OR
atlassiancrowdRange≀3.2.5
OR
atlassiancrowdRange≀3.3.2
OR
atlassiancrowdRange≀3.2.6
OR
atlassiancrowdRange≀3.2.7
OR
atlassiancrowdRange≀3.2.8
OR
atlassiancrowdRange≀3.2.11
OR
atlassiancrowdRange≀4.0.0
OR
atlassiancrowdRange≀4.1.0
OR
atlassiancrowdRange≀4.0.2
OR
atlassiancrowdRange≀4.2.0
OR
atlassiancrowdRange≀4.0.3
OR
atlassiancrowdRange≀4.1.2
OR
atlassiancrowdRange≀4.0.4
OR
atlassiancrowdRange≀4.1.3
OR
atlassiancrowdRange≀4.2.1
OR
atlassiancrowdRange≀4.3.0
OR
atlassiancrowdRange≀4.1.5
OR
atlassiancrowdRange≀4.2.2
OR
atlassiancrowdRange≀4.1.6
OR
atlassiancrowdRange≀4.1.8
OR
atlassiancrowdRange≀4.1.9
OR
atlassiancrowdRange≀4.2.3
OR
atlassiancrowdRange≀4.1.10
OR
atlassiancrowdRange≀4.2.4
OR
atlassiancrowdRange≀4.3.5
OR
atlassiancrowdRange≀4.2.5
OR
atlassiancrowdRange≀4.3.7
OR
atlassiancrowdRange≀4.3.8
OR
atlassiancrowdRange≀4.4.0
OR
atlassiancrowdRange≀4.4.1
OR
atlassiancrowdRange≀4.4.2
OR
atlassiancrowdRange≀5.0.0
OR
atlassiancrowdRange≀5.0.1
OR
atlassiancrowdRange≀4.3.9
OR
atlassiancrowdRange≀4.4.3
OR
atlassiancrowdRange≀5.0.2
OR
atlassiancrowdRange<5.1.0
OR
atlassiancrowdRange<4.4.4
OR
atlassiancrowdRange<5.0.3
VendorProductVersionCPE
atlassiancrowd*cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

56.0%