Affected versions of Atlassian Crowd allow an attacker to authenticate as theΒ crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowdβs REST API under the {{usermanagement}}Β path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default.
The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
[
{
"vendor": "Atlassian",
"product": "Crowd Data Center",
"versions": [
{
"version": "before 3.0.0",
"status": "unaffected"
},
{
"version": "before 4.4.4",
"status": "affected"
},
{
"version": "before 5.0.3",
"status": "affected"
}
]
},
{
"vendor": "Atlassian",
"product": "Crowd Server",
"versions": [
{
"version": "before 3.0.0",
"status": "unaffected"
},
{
"version": "before 4.4.4",
"status": "affected"
},
{
"version": "before 5.0.3",
"status": "affected"
}
]
}
]