Lucene search

K
nvd[email protected]NVD:CVE-2022-43782
HistoryNov 17, 2022 - 12:15 a.m.

CVE-2022-43782

2022-11-1700:15:18
web.nvd.nist.gov
1
atlassian crowd
security misconfiguration
rest api
usermanagement path
ip allowlist
remote addresses configuration
vulnerability
version 3.x.x
version 4.x.x
version 5.x.x

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

56.2%

Affected versions of Atlassian Crowd allow an attacker to authenticate as theΒ crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd’s REST API under the {{usermanagement}}Β path.

This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default.

The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3

Affected configurations

NVD
Node
atlassiancrowdRange3.0.0–4.4.4
OR
atlassiancrowdRange5.0.0–5.0.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

56.2%