Improper Authentication in Crowd Server - CVE-2017-16858

 

Improper Authentication in Crowd Server - CVE-2017-16858

Published: January 31, 2018 / Updated: July 17, 2020


Vulnerability identifier: #VU31358
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-16858
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Atlassian
Affected software:
Crowd Server

Detailed vulnerability description

The vulnerability allows a remote authenticated user to read and manipulate data.

The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1.


How to mitigate CVE-2017-16858

Install update from vendor's website.

Sources