-
Public Security Vulnerability
-
Resolution: Fixed
-
Low
-
3.0.0, (51)
3.0.1, 3.0.2, 3.0.3, 3.0.5, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.3.0, 3.1.5, 3.1.6, 3.2.5, 3.3.2, 3.2.6, 3.2.7, 3.2.8, 3.2.11, 4.0.0, 4.1.0, 4.0.2, 4.2.0, 4.0.3, 4.1.2, 4.0.4, 4.1.3, 4.2.1, 4.3.0, 4.1.5, 4.2.2, 4.1.6, 4.1.8, 4.1.9, 4.2.3, 4.1.10, 4.2.4, 4.3.5, 4.2.5, 4.3.7, 4.3.8, 4.4.0, 4.4.1, 4.4.2, 5.0.0, 5.0.1, 4.3.9, 4.4.3, 5.0.2 -
None
-
9.1
-
Critical
-
CVE-2022-43782
-
Crowd Data Center, Crowd Server
Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and call privileged endpoints in Crowd's REST API under the usermanagement path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is none by default.
The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
Affected versions:
- 3.x.x
- 4.x.x < 4.4.4
- 5.x.x < 5.0.3
Fixed versions:
- 4.4.4
- 5.0.3
- 5.1.0
Mitigation/Workaround:
To remediate this vulnerability, update each affected product installation to a fixed version listed above.
If you’re unable to upgrade Crowd, a temporary mitigation is to remove or validate any Remote Addresses for crowd application in the Crowd product. You can navigate to the Remote Address configuration by following the document here, and remove any remote addresses accordingly.
Additionally, change password for the crowd application to a strong password especially if a remote address is necessary.
For additional details, please see full advisory here: https://confluence.atlassian.com/x/UXurRQ
[CWD-5888] Crowd DC Critical Security Misconfiguration Vulnerability - CVE-2022-43782
Remote Link | New: This issue links to "Page (Confluence)" [ 810086 ] |
Affected Product(s) | New: Crowd Data Center,Crowd Server [ 18172, 18173 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 714548 ] |
Remote Link | Original: This issue links to "Page (Confluence)" [ 707365 ] |
Description |
Original:
Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and call privileged endpoints in Crowd's REST API under the {{usermanagement}} path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is none by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3 *Affected versions:* * 3.x.x * 4.x.x < 4.4.4 * 5.x.x < 5.0.3 *Fixed versions:* * 4.4.4 * 5.0.3 *Mitigation/Workaround:* To remediate this vulnerability, update each affected product installation to a fixed version listed above. If you’re unable to upgrade Crowd, a temporary mitigation is to remove or validate any Remote Addresses for {{crowd}} application in the Crowd product. You can navigate to the Remote Address configuration by following the document [here|https://confluence.atlassian.com/crowd/specifying-an-application-s-address-or-hostname-25788433.html], and remove any remote addresses accordingly. Additionally, change password for the {{crowd}} application to a strong password especially if a remote address is necessary. For additional details, please see full advisory here: [https://confluence.atlassian.com/x/UXurRQ] |
New:
Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and call privileged endpoints in Crowd's REST API under the {{usermanagement}} path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is none by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3 *Affected versions:* * 3.x.x * 4.x.x < 4.4.4 * 5.x.x < 5.0.3 *Fixed versions:* * 4.4.4 * 5.0.3 * 5.1.0 *Mitigation/Workaround:* To remediate this vulnerability, update each affected product installation to a fixed version listed above. If you’re unable to upgrade Crowd, a temporary mitigation is to remove or validate any Remote Addresses for {{crowd}} application in the Crowd product. You can navigate to the Remote Address configuration by following the document [here|https://confluence.atlassian.com/crowd/specifying-an-application-s-address-or-hostname-25788433.html], and remove any remote addresses accordingly. Additionally, change password for the {{crowd}} application to a strong password especially if a remote address is necessary. For additional details, please see full advisory here: [https://confluence.atlassian.com/x/UXurRQ] |
Fix Version/s | New: 5.1.0 [ 100694 ] |
CVE ID | New: CVE-2022-43782 |
Remote Link | New: This issue links to "Page (Confluence)" [ 707687 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 707365 ] |
Resolution | New: Fixed [ 1 ] | |
Security | Original: Atlassian Staff [ 10750 ] | |
Status | Original: Draft [ 12872 ] | New: Published [ 12873 ] |