-
Bug
-
Resolution: Fixed
-
Low
-
None
-
None
cert.fr@cassidian.com reported the following vulnerability:
== Type ==
Information Disclosure
== Product ==
Atlassian Crowd
== Severity ==
Medium
== Description ==
The crowd.token_key cookie, used as a token to authenticate on all Atlassian applications, is marked as HttpOnly.
However, the Crowd 500 error page (/crowd/console/500.jsp) displays this cookie?s value, breaking the HttpOnly behavior.
500.jsp iterates over the session properties before printing them. Add a check and replace crowd.token_key's value with XXXs. The cookie name can be configured: for a proper fix we'll need to check the current name.