Uploaded image for project: 'Crowd Data Center'
  1. Crowd Data Center
  2. CWD-5888

Crowd DC Critical Security Misconfiguration Vulnerability - CVE-2022-43782

    • Icon: Public Security Vulnerability Public Security Vulnerability
    • Resolution: Fixed
    • Icon: Low Low
    • 5.1.0, 4.4.4, 5.0.3
    • 3.0.0, (51)
      3.0.1, 3.0.2, 3.0.3, 3.0.5, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.3.0, 3.1.5, 3.1.6, 3.2.5, 3.3.2, 3.2.6, 3.2.7, 3.2.8, 3.2.11, 4.0.0, 4.1.0, 4.0.2, 4.2.0, 4.0.3, 4.1.2, 4.0.4, 4.1.3, 4.2.1, 4.3.0, 4.1.5, 4.2.2, 4.1.6, 4.1.8, 4.1.9, 4.2.3, 4.1.10, 4.2.4, 4.3.5, 4.2.5, 4.3.7, 4.3.8, 4.4.0, 4.4.1, 4.4.2, 5.0.0, 5.0.1, 4.3.9, 4.4.3, 5.0.2
    • None
    • 9.1
    • Critical
    • CVE-2022-43782
    • Crowd Data Center, Crowd Server

      Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and call privileged endpoints in Crowd's REST API under the usermanagement path. 

      This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is none by default.

      The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3

      Affected versions:

      • 3.x.x
      • 4.x.x < 4.4.4
      • 5.x.x < 5.0.3

      Fixed versions:

      • 4.4.4
      • 5.0.3
      • 5.1.0

       

      Mitigation/Workaround:

      To remediate this vulnerability, update each affected product installation to a fixed version listed above.

      If you’re unable to upgrade Crowd, a temporary mitigation is to remove or validate any Remote Addresses for crowd application in the Crowd product. You can navigate to the Remote Address configuration by following the document here, and remove any remote addresses accordingly.

      Additionally, change password for the crowd application to a strong password especially if a remote address is necessary.

       

      For additional details, please see full advisory here: https://confluence.atlassian.com/x/UXurRQ

       

          Form Name

            [CWD-5888] Crowd DC Critical Security Misconfiguration Vulnerability - CVE-2022-43782

            This is an independent assessment and you should evaluate its applicability to your own IT environment.

            CVSS v3 score: 9.1 => Critical severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity Low
            Privileges Required None
            User Interaction None

            Scope Metric

            Scope Unchanged

            Impact Metrics

            Confidentiality High
            Integrity High
            Availability None

            https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

            Chris Tao (Inactive) added a comment - This is an independent assessment and you should evaluate its applicability to your own IT environment. CVSS v3 score: 9.1 => Critical severity Exploitability Metrics Attack Vector Network Attack Complexity Low Privileges Required None User Interaction None Scope Metric Scope Unchanged Impact Metrics Confidentiality High Integrity High Availability None https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: