CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
56.0%
Affected versions of Atlassian Crowd allow an attacker to authenticate as theΒ crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowdβs REST API under the {{usermanagement}}Β path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default.
The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
[
{
"vendor": "Atlassian",
"product": "Crowd Data Center",
"versions": [
{
"version": "before 3.0.0",
"status": "unaffected"
},
{
"version": "before 4.4.4",
"status": "affected"
},
{
"version": "before 5.0.3",
"status": "affected"
}
]
},
{
"vendor": "Atlassian",
"product": "Crowd Server",
"versions": [
{
"version": "before 3.0.0",
"status": "unaffected"
},
{
"version": "before 4.4.4",
"status": "affected"
},
{
"version": "before 5.0.3",
"status": "affected"
}
]
}
]
More