Show filters
56 Total Results
Displaying 31-40 of 56
Sort by:
Attacker Value
Unknown
CVE-2017-18107
Disclosure Date: December 17, 2019 (last updated November 27, 2024)
Various resources in the Crowd Demo application of Atlassian Crowd before version 3.1.1 allow remote attackers to modify add, modify and delete users & groups via a Cross-site request forgery (CSRF) vulnerability. Please be aware that the Demo application is not enabled by default.
0
Attacker Value
Unknown
CVE-2019-15005
Disclosure Date: November 08, 2019 (last updated November 27, 2024)
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
0
Attacker Value
Unknown
CVE-2019-20902
Disclosure Date: July 25, 2019 (last updated November 28, 2024)
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.
0
Attacker Value
Unknown
CVE-2018-20239
Disclosure Date: April 30, 2019 (last updated November 27, 2024)
Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.
0
Attacker Value
Unknown
CVE-2019-1003097
Disclosure Date: April 04, 2019 (last updated October 26, 2023)
Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
0
Attacker Value
Unknown
CVE-2017-18108
Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection.
0
Attacker Value
Unknown
CVE-2017-18105
Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability.
0
Attacker Value
Unknown
CVE-2017-18110
Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability.
0
Attacker Value
Unknown
CVE-2017-18109
Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect.
0
Attacker Value
Unknown
CVE-2017-18106
Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can make their identifier hash collide with another user's session identifier hash.
0