-
Bug
-
Resolution: Fixed
-
Low
-
None
-
None
cert.fr@cassidian.com reported the following vulnerability:
== Type ==
Information Disclosure
== Product ==
Atlassian Crowd
== Severity ==
Medium
== Description ==
The crowd.token_key cookie, used as a token to authenticate on all Atlassian applications, is marked as HttpOnly.
However, the Crowd 500 error page (/crowd/console/500.jsp) displays this cookie?s value, breaking the HttpOnly behavior.
[CWD-2950] Crowd leaks the value of the HTTP only 'crowd.token_key' cookie on the crowd/console/500.jsp page
Labels | Original: infoleak no-advisory-required security | New: infoleak information-disclosure no-advisory-required security |
Workflow | Original: Simplified Crowd Development Workflow v2 - restricted [ 1509632 ] | New: JAC Bug Workflow v3 [ 3364670 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Workflow | Original: Simplified Crowd Development Workflow v2 [ 1391801 ] | New: Simplified Crowd Development Workflow v2 - restricted [ 1509632 ] |
Workflow | Original: Crowd Development Workflow v2 [ 442784 ] | New: Simplified Crowd Development Workflow v2 [ 1391801 ] |
Link | New: This issue causes CWD-3193 [ CWD-3193 ] |
Labels | Original: infoleak security | New: infoleak no-advisory-required security |
Security | Original: Reporters and Developers [ 10071 ] |
Remote Link | New: This issue links to "Wiki Page (Extranet)" [ 27816 ] |
Remote Link | New: This issue links to "Wiki Page (Extranet)" [ 27802 ] |
Priority | Original: Critical [ 2 ] | New: Minor [ 4 ] |