-
Bug
-
Resolution: Fixed
-
Low
-
None
-
None
-
Severity 3 - Minor
-
The mostActiveCommitters.do resource in Atlassian FishEye and Crucible, before version 4.4.1 allows anonymous remote attackers to access sensitive information, for example email addresses of committers, as it lacked permission checks.
- is cloned from
-
FE-6892 mostActiveCommitters.do lacks permission checks - CVE-2017-9512
-
- Closed
-
[CRUC-8053] mostActiveCommitters.do lacks permission checks - CVE-2017-9512
Labels | Original: CVE-2017-9512 advisory-released cvss-medium security | New: CVE-2017-9512 advisory-released basm cvss-medium security |
Workflow | Original: FE-CRUC Bug Workflow [ 2941990 ] | New: JAC Bug Workflow v3 [ 2954369 ] |
Workflow | Original: FECRU Development Workflow - Triage - Restricted [ 2409601 ] | New: FE-CRUC Bug Workflow [ 2941990 ] |
Remote Link | Original: This issue links to "Page (Extranet)" [ 314234 ] |
Description | Original: The mostActiveCommitters.do resource in Atlassian FishEye and Crucible, before version 4.4.1 allows anonymous remote attackers to access sensitive information, for example email addresses and other committer information, as it lacked permission checks. | New: The mostActiveCommitters.do resource in Atlassian FishEye and Crucible, before version 4.4.1 allows anonymous remote attackers to access sensitive information, for example email addresses of committers, as it lacked permission checks. |
Labels | Original: advisory-released cvss-medium security | New: CVE-2017-9512 advisory-released cvss-medium security |
Summary | Original: mostActiveCommitters.do available to anonymous users | New: mostActiveCommitters.do lacks permission checks - CVE-2017-9512 |
Description | Original: Anonymous users have access to the mostActiveCommitters.do which leaks some sensitive information (such as email addresses). | New: The mostActiveCommitters.do resource in Atlassian FishEye and Crucible, before version 4.4.1 allows anonymous remote attackers to access sensitive information, for example email addresses and other committer information, as it lacked permission checks. |
Remote Link | New: This issue links to "Page (Extranet)" [ 314234 ] |
CVSS v3 score: 5.3 => Medium severity
Exploitability Metrics
Scope Metric
Impact Metrics
See http://go.atlassian.com/cvss for more details.
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N