Vulnerabilities > Atlassian > Crowd

DATE CVE VULNERABILITY TITLE RISK
2019-04-30 CVE-2018-20239 Cross-site Scripting vulnerability in Atlassian products
Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter.
network
low complexity
atlassian CWE-79
5.4
2019-03-29 CVE-2017-18110 XXE vulnerability in Atlassian Crowd
The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability.
network
low complexity
atlassian CWE-611
6.5
2019-03-29 CVE-2017-18109 Open Redirect vulnerability in Atlassian Crowd
The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect.
network
low complexity
atlassian CWE-601
6.1
2019-03-29 CVE-2017-18108 Code Injection vulnerability in Atlassian Crowd
The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection.
network
low complexity
atlassian CWE-94
7.2
2019-03-29 CVE-2017-18106 Improper Authentication vulnerability in Atlassian Crowd
The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can make their identifier hash collide with another user's session identifier hash.
network
high complexity
atlassian CWE-287
7.5
2019-03-29 CVE-2017-18105 Session Fixation vulnerability in Atlassian Crowd
The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability.
network
high complexity
atlassian CWE-384
8.1
2019-02-13 CVE-2018-20238 Session Fixation vulnerability in Atlassian Crowd
Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
network
low complexity
atlassian CWE-384
8.1
2019-01-29 CVE-2016-10740 Information Exposure vulnerability in Atlassian Crowd
Various resources in Atlassian Crowd before version 2.10.1 allow remote attackers with administration rights to learn the passwords of configured LDAP directories by examining the responses to requests for these resources.
network
low complexity
atlassian CWE-200
4.9
2018-01-31 CVE-2017-16858 Improper Authentication vulnerability in Atlassian Crowd
The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature.
network
high complexity
atlassian CWE-287
6.8
2016-12-09 CVE-2016-6496 Improper Input Validation vulnerability in Atlassian Crowd
The LDAP directory connector in Atlassian Crowd before 2.8.8 and 2.9.x before 2.9.5 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning.
network
low complexity
atlassian CWE-20
critical
9.8