We have identified and fixed a vulnerability in Crowd that results from the way XML parsers are used. This vulnerability allows an attacker to:

      • Execute denial of service attacks against the Crowd server, or
      • Read all local files readable to the system user under which Crowd runs.

      All versions of Crowd up to and including 2.4.0 are affected by this vulnerability.

      Full details of the severity, risks and vulnerability can be found in the Crowd Security Advisory 2012-05-17.

          Form Name

            [CWD-2797] XML Vulnerability in Crowd

            VitalyA added a comment -

            To install the patch, navigate to the atlassian-crowd-x.x.x (where x.x.x is the Crowd version) directory and unzip the patch file.

            Note, the patches are only available for the point release indicated. If you are using an earlier point release for a major version, you must upgrade to the latest point release first.

            VitalyA added a comment - To install the patch, navigate to the atlassian-crowd-x.x.x (where x.x.x is the Crowd version) directory and unzip the patch file. Note, the patches are only available for the point release indicated. If you are using an earlier point release for a major version, you must upgrade to the latest point release first.

            joe added a comment - - edited

            joe added a comment - - edited Patches for the most recent point release of the current and previous version are here: http://downloads.atlassian.com/software/crowd/downloads/patch/patch-CWD-2797-2.3.6.zip http://downloads.atlassian.com/software/crowd/downloads/patch/patch-CWD-2797-2.4.0.zip

              vosipov VitalyA
              jwalton joe
              Affected customers:
              0 This affects my team
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: