Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU69412
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-43782
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected application.
The vulnerability exists due to a security misconfiguration. A remote attacker connecting from IP in the allow list to authenticate as the crowd application through bypassing a password check can access privileged endpoints in Crowd's REST API under the usermanagement path and compromise the affected application.
The vulnerability exists only under the following conditions:
Install updates from vendor's website.
Vulnerable software versionsCrowd: 3.0 - 5.0.2
CPE2.3https://jira.atlassian.com/browse/CWD-5888
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.