-
Bug
-
Resolution: Fixed
-
Low
-
3.7.0
-
Severity 3 - Minor
-
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability. This issue was addressed by disabling the OpenID client application in Crowd.
Please be aware that the OpenID client application is a testing app used as a starting point for developing OpenID-enabled Java applications. It is bundled with the standard Crowd distribution and it was deployed by default prior to Crowd Version 3.6.2. Moreover it runs in the same Tomcat container as the Crowd and OpenID Server. However, this application is not required for Crowd or OpenID server to work correctly. Regarding this security vulnerability, the OpenID client application has been disabled by default since Crowd version 3.6.2. If you are running older version of Crowd, and at the moment you are unable to update Crowd, then you can disable the Crowd OpenID client application manually by executing the procedure found here.
- mentioned in
-
Page Failed to load
[CWD-5526] XXE in OpenID client application - CVE-2019-20104
Remote Link | New: This issue links to "Page (Confluence)" [ 489829 ] |
Summary | Original: XXE in OpenID client - CVE-2019-20104 | New: XXE in OpenID client application - CVE-2019-20104 |
Description |
Original:
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability. This issue was addressed by disabling the OpenID client application in Crowd.
Please be aware that the OpenID client application is a testing app used as a starting point for developing OpenID-enabled Java applications. It is bundled with the standard Crowd distribution and it was deployed by default prior to Crowd Version 3.6.2. Moreover it runs in the same Tomcat container as the Crowd and OpenID Server. However, this application is not required for Crowd or OpenID server to work correctly. Regarding this security vulnerability, the OpenID client application has been disabled by default since Crowd version 3.6.2. If you are running older version of Crowd, and at the moment you are unable to update Crowd, then you can disable this app manually by executing the procedure found [here|https://confluence.atlassian.com/crowd/disabling-the-openid-client-app-986879764.html]. |
New:
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability. This issue was addressed by disabling the OpenID client application in Crowd.
Please be aware that the OpenID client application is a testing app used as a starting point for developing OpenID-enabled Java applications. It is bundled with the standard Crowd distribution and it was deployed by default prior to Crowd Version 3.6.2. Moreover it runs in the same Tomcat container as the Crowd and OpenID Server. However, this application is not required for Crowd or OpenID server to work correctly. Regarding this security vulnerability, the OpenID client application has been disabled by default since Crowd version 3.6.2. If you are running older version of Crowd, and at the moment you are unable to update Crowd, then you can disable the Crowd OpenID client application manually by executing the procedure found [here|https://confluence.atlassian.com/crowd/disabling-the-openid-client-app-986879764.html]. |
Description |
Original:
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability. This issue was addressed by disabling the OpenID client application in Crowd.
Please be aware that the OpenID client application is a testing app used as a starting point for developing OpenID-enabled Java applications. It is bundled with the standard Crowd distribution and it is deployed by default. Moreover it runs in the same Tomcat container as the Crowd and OpenID Server. However, this application is not required for Crowd or OpenID server to work correctly. Regarding this security vulnerability, the OpenID client application has been disabled by default since Crowd version 3.6.2. If you are running older version of Crowd, and at the moment you are unable to update Crowd, then you can disable this app manually by executing the procedure found [here|https://confluence.atlassian.com/crowd/disabling-the-openid-client-app-986879764.html]. |
New:
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability. This issue was addressed by disabling the OpenID client application in Crowd.
Please be aware that the OpenID client application is a testing app used as a starting point for developing OpenID-enabled Java applications. It is bundled with the standard Crowd distribution and it was deployed by default prior to Crowd Version 3.6.2. Moreover it runs in the same Tomcat container as the Crowd and OpenID Server. However, this application is not required for Crowd or OpenID server to work correctly. Regarding this security vulnerability, the OpenID client application has been disabled by default since Crowd version 3.6.2. If you are running older version of Crowd, and at the moment you are unable to update Crowd, then you can disable this app manually by executing the procedure found [here|https://confluence.atlassian.com/crowd/disabling-the-openid-client-app-986879764.html]. |
Description |
Original:
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability.
|
New:
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability. This issue was addressed by disabling the OpenID client application in Crowd.
Please be aware that the OpenID client application is a testing app used as a starting point for developing OpenID-enabled Java applications. It is bundled with the standard Crowd distribution and it is deployed by default. Moreover it runs in the same Tomcat container as the Crowd and OpenID Server. However, this application is not required for Crowd or OpenID server to work correctly. Regarding this security vulnerability, the OpenID client application has been disabled by default since Crowd version 3.6.2. If you are running older version of Crowd, and at the moment you are unable to update Crowd, then you can disable this app manually by executing the procedure found [here|https://confluence.atlassian.com/crowd/disabling-the-openid-client-app-986879764.html]. |
Labels | Original: CVE-2019-20104 advisory advisory-to-release bugbounty cvss-medium injection security xxe | New: CVE-2019-20104 advisory advisory-released bugbounty cvss-medium injection security xxe |
Security | Original: Atlassian Staff [ 10750 ] |
Description |
Original:
OpenID in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability.
|
New:
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability.
|
Description | Original: OpenID in Atlassian Crowd from version 3.7.0 before version 3.6.2, before version 3.7.1 and before version 4.0.0 allows remote attackers to perform a Denial of Service attack via a XML Entity Expansion. |
New:
OpenID in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability.
|
Description | Original: Component in Atlassian Crowd from version 3.7.0 before version 3.6.2, before version 3.7.1 and before version 4.0.0 allows remote attackers to perform a Denial of Service attack via a XML Entity Expansion within the OpenID client. | New: OpenID in Atlassian Crowd from version 3.7.0 before version 3.6.2, before version 3.7.1 and before version 4.0.0 allows remote attackers to perform a Denial of Service attack via a XML Entity Expansion. |