Improper access control in Crowd Server - CVE-2022-43782

 

Improper access control in Crowd Server - CVE-2022-43782

Published: November 18, 2022


Vulnerability identifier: #VU69412
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-43782
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Crowd Server
Software vendor:
Atlassian

Description

The vulnerability allows a remote attacker to compromise the affected application.

The vulnerability exists due to a security misconfiguration. A remote attacker connecting from IP in the allow list to authenticate as the crowd application through bypassing a password check can access privileged endpoints in Crowd's REST API under the usermanagement path and compromise the affected application.

The vulnerability exists only under the following conditions:

  • the vulnerability concerns only new installations of affected versions: if you upgraded from an earlier version, for example version 2.9.1, to version 3.0.0 or later, your instance is not affected.
  • an IP address has been added to the Remote Address configuration of the crowd application (which is none by default in versions after 3.0.0)

Remediation

Install updates from vendor's website.

External links