Vulnerabilities > Atlassian > Crowd > High

DATE CVE VULNERABILITY TITLE RISK
2023-11-21 CVE-2023-22521 Unspecified vulnerability in Atlassian Crowd
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.6 of Crowd Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.0, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Crowd Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Crowd Data Center and Server 3.4: Upgrade to a release greater than or equal to 5.1.6 Crowd Data Center and Server 5.2: Upgrade to a release greater than or equal to 5.2.1 See the release notes ([https://confluence.atlassian.com/crowd/crowd-release-notes-199094.html]).
network
low complexity
atlassian
8.8
2022-07-20 CVE-2022-26137 Origin Validation Error vulnerability in Atlassian products
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses.
network
low complexity
atlassian CWE-346
8.8
2020-10-01 CVE-2019-20902 Unspecified vulnerability in Atlassian Crowd
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP.
network
low complexity
atlassian
7.5
2020-02-06 CVE-2019-20104 XML Entity Expansion vulnerability in Atlassian Crowd
The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability.
network
low complexity
atlassian CWE-776
7.5
2019-03-29 CVE-2017-18108 Code Injection vulnerability in Atlassian Crowd
The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection.
network
low complexity
atlassian CWE-94
7.2
2019-03-29 CVE-2017-18106 Improper Authentication vulnerability in Atlassian Crowd
The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can make their identifier hash collide with another user's session identifier hash.
network
high complexity
atlassian CWE-287
7.5
2019-03-29 CVE-2017-18105 Session Fixation vulnerability in Atlassian Crowd
The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability.
network
high complexity
atlassian CWE-384
8.1
2019-02-13 CVE-2018-20238 Session Fixation vulnerability in Atlassian Crowd
Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
network
low complexity
atlassian CWE-384
8.1