All the vulnerabilites related to Atlassian - Crowd
cve-2017-18109
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5071 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5071" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.0.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-03-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect." } ], "problemTypes": [ { "descriptions": [ { "description": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-29T14:04:53", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5071" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-03-23T00:00:00", "ID": "CVE-2017-18109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.2" }, { "version_affected": "\u003e=", "version_value": "3.1.0" }, { "version_affected": "\u003c", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5071", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5071" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18109", "datePublished": "2019-03-29T14:04:53.255719Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T17:08:13.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18108
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5062 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.822Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5062" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "2.10.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-29T14:04:53", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5062" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-04-16T00:00:00", "ID": "CVE-2017-18108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.10.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5062", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5062" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18108", "datePublished": "2019-03-29T14:04:53.218686Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T22:30:08.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18105
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5072 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5072" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.0.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-03-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user\u0027s JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Session Fixation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-29T14:04:53", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5072" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-03-23T00:00:00", "ID": "CVE-2017-18105", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.2" }, { "version_affected": "\u003e=", "version_value": "3.1.0" }, { "version_affected": "\u003c", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user\u0027s JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5072", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5072" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18105", "datePublished": "2019-03-29T14:04:53.127166Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T20:42:15.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18107
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5091 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5091" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Various resources in the Crowd Demo application of Atlassian Crowd before version 3.1.1 allow remote attackers to modify add, modify and delete users \u0026 groups via a Cross-site request forgery (CSRF) vulnerability. Please be aware that the Demo application is not enabled by default." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T03:45:13", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5091" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-02-07T00:00:00", "ID": "CVE-2017-18107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various resources in the Crowd Demo application of Atlassian Crowd before version 3.1.1 allow remote attackers to modify add, modify and delete users \u0026 groups via a Cross-site request forgery (CSRF) vulnerability. Please be aware that the Demo application is not enabled by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5091", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5091" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18107", "datePublished": "2019-12-17T03:45:13.620288Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T20:06:27.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20238
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5361 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/107036 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5361" }, { "name": "107036", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.2.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.3.0", "versionType": "custom" }, { "lessThan": "3.3.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Session Expiration", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-16T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CWD-5361" }, { "name": "107036", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-02-13T00:00:00", "ID": "CVE-2018-20238", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.2.7" }, { "version_affected": "\u003e=", "version_value": "3.3.0" }, { "version_affected": "\u003c", "version_value": "3.3.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Session Expiration" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5361", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CWD-5361" }, { "name": "107036", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107036" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-20238", "datePublished": "2019-02-13T18:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T20:41:48.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-16858
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5009 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5009" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "from 1.5.0 before 3.1.2" } ] } ], "datePublic": "2018-01-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The \u0027crowd-application\u0027 plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "Incorrect Authorization (CWE-863)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-31T13:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CWD-5009" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-01-30T00:00:00", "ID": "CVE-2017-16858", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_value": "from 1.5.0 before 3.1.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The \u0027crowd-application\u0027 plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Authorization (CWE-863)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5009", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CWD-5009" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-16858", "datePublished": "2018-01-31T14:00:00Z", "dateReserved": "2017-11-16T00:00:00", "dateUpdated": "2024-09-17T00:40:54.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3926
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf | x_refsource_MISC | |
http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlassian-crowd | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:22:01.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlassian-crowd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Crowd 2.6.3 allows remote attackers to execute arbitrary commands via unspecified vectors related to a \"symmetric backdoor.\" NOTE: as of 20130704, the vendor could not reproduce the issue, stating \"We\u0027ve been unable to substantiate the existence of [CVE-2013-3926]. The author of the article has not contacted Atlassian and has provided no detail, making it difficult to validate the claim... If we can confirm that there is a vulnerability, a patch will be issued." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-09T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlassian-crowd" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** Atlassian Crowd 2.6.3 allows remote attackers to execute arbitrary commands via unspecified vectors related to a \"symmetric backdoor.\" NOTE: as of 20130704, the vendor could not reproduce the issue, stating \"We\u0027ve been unable to substantiate the existence of [CVE-2013-3926]. The author of the article has not contacted Atlassian and has provided no detail, making it difficult to validate the claim... If we can confirm that there is a vulnerability, a patch will be issued.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf", "refsource": "MISC", "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf" }, { "name": "http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlassian-crowd", "refsource": "MISC", "url": "http://it.slashdot.org/story/13/07/01/0011217/backdoor-discovered-in-atlassian-crowd" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3926", "datePublished": "2013-07-01T21:00:00", "dateReserved": "2013-06-04T00:00:00", "dateUpdated": "2024-08-06T16:22:01.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-20902
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5409 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:53:09.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5409" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.4.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.5.0", "versionType": "custom" }, { "lessThan": "3.5.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1." } ], "problemTypes": [ { "descriptions": [ { "description": "Broken Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-01T01:30:19", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5409" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-07-25T00:00:00", "ID": "CVE-2019-20902", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.4.6" }, { "version_affected": "\u003e=", "version_value": "3.5.0" }, { "version_affected": "\u003c", "version_value": "3.5.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Broken Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5409", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5409" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-20902", "datePublished": "2020-10-01T01:30:19.193146Z", "dateReserved": "2020-07-07T00:00:00", "dateUpdated": "2024-09-17T01:31:07.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22521
Vulnerability from cvelistv5
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Crowd Data Center |
Version: >= 3.4.6 Version: >= 5.2.0 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1318881573" }, { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-6139" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 3.4.6" }, { "status": "affected", "version": "\u003e= 3.4.6" }, { "status": "affected", "version": "\u003e= 5.2.0" }, { "status": "unaffected", "version": "\u003e= 5.1.6" }, { "status": "unaffected", "version": "\u003e= 5.2.1" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 3.4.6" }, { "status": "affected", "version": "\u003e= 3.4.6" }, { "status": "affected", "version": "\u003e= 5.2.0" }, { "status": "unaffected", "version": "\u003e= 5.1.6" }, { "status": "unaffected", "version": "\u003e= 5.2.1" } ] } ], "credits": [ { "lang": "en", "value": "m1sn0w" } ], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.6 of Crowd Data Center and Server.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.0, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.\r\n\r\nAtlassian recommends that Crowd Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Crowd Data Center and Server 3.4: Upgrade to a release greater than or equal to 5.1.6\r\n Crowd Data Center and Server 5.2: Upgrade to a release greater than or equal to 5.2.1\r\n\r\nSee the release notes ([https://confluence.atlassian.com/crowd/crowd-release-notes-199094.html]). You can download the latest version of Crowd Data Center and Server from the download center ([https://www.atlassian.com/software/crowd/download-archive]).\r\n\r\nThis vulnerability was discovered by m1sn0w and reported via our Bug Bounty program" } ], "metrics": [ { "cvssV3_0": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "RCE (Remote Code Execution)", "lang": "en", "type": "RCE (Remote Code Execution)" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-29T19:00:00.539Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1318881573" }, { "url": "https://jira.atlassian.com/browse/CWD-6139" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2023-22521", "datePublished": "2023-11-21T18:00:00.751Z", "dateReserved": "2023-01-01T00:01:22.332Z", "dateUpdated": "2024-08-02T10:13:48.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6496
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-4790 | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/539655/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf | x_refsource_MISC | |
https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/93826 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:20.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-4790" }, { "name": "20161031 October 2016 - Crowd - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/539655/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html" }, { "name": "93826", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93826" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The LDAP directory connector in Atlassian Crowd before 2.8.8 and 2.9.x before 2.9.5 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CWD-4790" }, { "name": "20161031 October 2016 - Crowd - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/539655/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html" }, { "name": "93826", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93826" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2016-6496", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The LDAP directory connector in Atlassian Crowd before 2.8.8 and 2.9.x before 2.9.5 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-4790", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CWD-4790" }, { "name": "20161031 October 2016 - Crowd - Critical Security Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/539655/100/0/threaded" }, { "name": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf", "refsource": "MISC", "url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf" }, { "name": "https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html" }, { "name": "93826", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93826" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2016-6496", "datePublished": "2016-12-09T22:00:00", "dateReserved": "2016-08-01T00:00:00", "dateUpdated": "2024-08-06T01:29:20.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26137
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-21795 | x_refsource_MISC | |
https://jira.atlassian.com/browse/BSERV-13370 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CONFSERVER-79476 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-5815 | x_refsource_MISC | |
https://jira.atlassian.com/browse/FE-7410 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CRUC-8541 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JRASERVER-73897 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JSDSERVER-11863 | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Bamboo Server |
Version: unspecified < 8.0.9 Version: 8.1.0 < unspecified Version: unspecified < 8.1.8 Version: 8.2.0 < unspecified Version: unspecified < 8.2.4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bamboo", "vendor": "atlassian", "versions": [ { "lessThan": "7.2.10", "status": "affected", "version": "7.2.0", "versionType": "custom" }, { "lessThan": "8.0.9", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "8.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "7.20.1", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "7.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "4.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "5.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crucible", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fisheye", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-26137", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T16:48:52.174175Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T17:10:16.886Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bamboo Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Core Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim\u2019s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-180", "description": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T17:25:23", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-07-20T00:00:00", "ID": "CVE-2022-26137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bamboo Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Crowd Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crowd Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Jira Core Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Service Management Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } }, { "product_name": "Jira Service Management Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim\u2019s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-21795", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "name": "https://jira.atlassian.com/browse/BSERV-13370", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-79476", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "name": "https://jira.atlassian.com/browse/CWD-5815", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "name": "https://jira.atlassian.com/browse/FE-7410", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-7410" }, { "name": "https://jira.atlassian.com/browse/CRUC-8541", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-73897", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "name": "https://jira.atlassian.com/browse/JSDSERVER-11863", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26137", "datePublished": "2022-07-20T17:25:23.603830Z", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-10-03T17:10:16.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-20104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:32:10.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5526" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.7.0", "versionType": "custom" }, { "lessThan": "3.7.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of XML External Entity Reference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-10T16:41:55", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5526" }, { "tags": [ "x_refsource_MISC" ], "url": "https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-02-05T00:00:00", "ID": "CVE-2019-20104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.6.2" }, { "version_affected": "\u003e=", "version_value": "3.7.0" }, { "version_affected": "\u003c", "version_value": "3.7.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of XML External Entity Reference" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5526", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5526" }, { "name": "https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/", "refsource": "MISC", "url": "https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-20104", "datePublished": "2020-02-06T03:10:24.881912Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T17:04:16.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26136
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-21795 | x_refsource_MISC | |
https://jira.atlassian.com/browse/BSERV-13370 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CONFSERVER-79476 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-5815 | x_refsource_MISC | |
https://jira.atlassian.com/browse/FE-7410 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CRUC-8541 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JRASERVER-73897 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JSDSERVER-11863 | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Bamboo Server |
Version: unspecified < 8.0.9 Version: 8.1.0 < unspecified Version: unspecified < 8.1.8 Version: 8.2.0 < unspecified Version: unspecified < 8.2.4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bamboo", "vendor": "atlassian", "versions": [ { "lessThan": "7.2.10", "status": "affected", "version": "7.2.0", "versionType": "custom" }, { "lessThan": "8.0.9", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "8.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "7.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "4.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "5.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crucible", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fisheye", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-26136", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:26:49.090400Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T16:43:16.268Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bamboo Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Core Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-180", "description": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180).", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T17:25:18", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-07-20T00:00:00", "ID": "CVE-2022-26136", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bamboo Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Crowd Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crowd Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Jira Core Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Service Management Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } }, { "product_name": "Jira Service Management Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)." } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-21795", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "name": "https://jira.atlassian.com/browse/BSERV-13370", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-79476", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "name": "https://jira.atlassian.com/browse/CWD-5815", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "name": "https://jira.atlassian.com/browse/FE-7410", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-7410" }, { "name": "https://jira.atlassian.com/browse/CRUC-8541", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-73897", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "name": "https://jira.atlassian.com/browse/JSDSERVER-11863", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26136", "datePublished": "2022-07-20T17:25:18.803466Z", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-10-03T16:43:16.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18110
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5070 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5070" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.0.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-03-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-29T14:04:53", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5070" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-03-23T00:00:00", "ID": "CVE-2017-18110", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.2" }, { "version_affected": "\u003e=", "version_value": "3.1.0" }, { "version_affected": "\u003c", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5070", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5070" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18110", "datePublished": "2019-03-29T14:04:53.296517Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T18:08:23.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-10740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5060 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:30:20.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5060" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Various resources in Atlassian Crowd before version 2.10.1 allow remote attackers with administration rights to learn the passwords of configured LDAP directories by examining the responses to requests for these resources." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-29T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CWD-5060" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-10740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various resources in Atlassian Crowd before version 2.10.1 allow remote attackers with administration rights to learn the passwords of configured LDAP directories by examining the responses to requests for these resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5060", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CWD-5060" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10740", "datePublished": "2019-01-29T02:00:00Z", "dateReserved": "2019-01-28T00:00:00Z", "dateUpdated": "2024-09-16T18:24:07.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3925
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-3366 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:22:01.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-3366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Atlassian Crowd 2.5.x before 2.5.4, 2.6.x before 2.6.3, 2.3.8, and 2.4.9 allows remote attackers to read arbitrary files and send HTTP requests to intranet servers via a request to (1) /services/2 or (2) services/latest with a DTD containing an XML external entity declaration in conjunction with an entity reference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-01T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CWD-3366" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Crowd 2.5.x before 2.5.4, 2.6.x before 2.6.3, 2.3.8, and 2.4.9 allows remote attackers to read arbitrary files and send HTTP requests to intranet servers via a request to (1) /services/2 or (2) services/latest with a DTD containing an XML external entity declaration in conjunction with an entity reference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf", "refsource": "MISC", "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf" }, { "name": "https://jira.atlassian.com/browse/CWD-3366", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CWD-3366" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3925", "datePublished": "2013-07-01T21:00:00Z", "dateReserved": "2013-06-04T00:00:00Z", "dateUpdated": "2024-09-16T19:37:09.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20239
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ecosystem.atlassian.net/browse/APL-1373 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CRUC-8379 | x_refsource_MISC | |
https://jira.atlassian.com/browse/FE-7161 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CONFSERVER-58208 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-5362 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JRASERVER-68855 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Atlassian Application Links |
Version: unspecified < 5.0.11 Version: 5.1.0 < unspecified Version: unspecified < 5.2.10 Version: 5.3.0 < unspecified Version: unspecified < 5.3.6 Version: 5.4.0 < unspecified Version: unspecified < 5.4.12 Version: 6.0.0 < unspecified Version: unspecified < 6.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ecosystem.atlassian.net/browse/APL-1373" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8379" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7161" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-58208" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5362" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-68855" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Atlassian Application Links", "vendor": "Atlassian", "versions": [ { "lessThan": "5.0.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.1.0", "versionType": "custom" }, { "lessThan": "5.2.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.4.0", "versionType": "custom" }, { "lessThan": "5.4.12", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-29T20:20:19", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ecosystem.atlassian.net/browse/APL-1373" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8379" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-7161" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-58208" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5362" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-68855" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-04-29T00:00:00", "ID": "CVE-2018-20239", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Atlassian Application Links", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.0.11" }, { "version_affected": "\u003e=", "version_value": "5.1.0" }, { "version_affected": "\u003c", "version_value": "5.2.10" }, { "version_affected": "\u003e=", "version_value": "5.3.0" }, { "version_affected": "\u003c", "version_value": "5.3.6" }, { "version_affected": "\u003e=", "version_value": "5.4.0" }, { "version_affected": "\u003c", "version_value": "5.4.12" }, { "version_affected": "\u003e=", "version_value": "6.0.0" }, { "version_affected": "\u003c", "version_value": "6.0.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://ecosystem.atlassian.net/browse/APL-1373", "refsource": "MISC", "url": "https://ecosystem.atlassian.net/browse/APL-1373" }, { "name": "https://jira.atlassian.com/browse/CRUC-8379", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8379" }, { "name": "https://jira.atlassian.com/browse/FE-7161", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-7161" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-58208", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-58208" }, { "name": "https://jira.atlassian.com/browse/CWD-5362", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5362" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-68855", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-68855" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-20239", "datePublished": "2019-04-30T15:28:27.775475Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T20:01:43.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11580
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5388 | x_refsource_MISC | |
http://www.securityfocus.com/bid/108637 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Crowd |
Version: 2.1.0 < unspecified Version: unspecified < 3.0.5 Version: 3.1.0 < unspecified Version: unspecified < 3.1.6 Version: 3.2.0 < unspecified Version: unspecified < 3.2.8 Version: 3.3.0 < unspecified Version: unspecified < 3.3.5 Version: 3.4.0 < unspecified Version: unspecified < 3.4.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:41.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5388" }, { "name": "108637", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108637" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "3.0.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.1.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.3.0", "versionType": "custom" }, { "lessThan": "3.3.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "3.4.0", "versionType": "custom" }, { "lessThan": "3.4.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Leftover Debug Code", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-12T17:06:12", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5388" }, { "name": "108637", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108637" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-05-22T00:00:00", "ID": "CVE-2019-11580", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.1.0" }, { "version_affected": "\u003c", "version_value": "3.0.5" }, { "version_affected": "\u003e=", "version_value": "3.1.0" }, { "version_affected": "\u003c", "version_value": "3.1.6" }, { "version_affected": "\u003e=", "version_value": "3.2.0" }, { "version_affected": "\u003c", "version_value": "3.2.8" }, { "version_affected": "\u003e=", "version_value": "3.3.0" }, { "version_affected": "\u003c", "version_value": "3.3.5" }, { "version_affected": "\u003e=", "version_value": "3.4.0" }, { "version_affected": "\u003c", "version_value": "3.4.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Leftover Debug Code" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5388", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5388" }, { "name": "108637", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108637" }, { "name": "http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-11580", "datePublished": "2019-06-03T13:43:48.001995Z", "dateReserved": "2019-04-29T00:00:00", "dateUpdated": "2024-09-16T20:47:44.405Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43782
Vulnerability from cvelistv5
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Crowd Data Center |
Version: before 4.4.4 Version: before 5.0.3 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:40:06.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5888" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "lessThan": "4.4.4", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "5.0.3", "status": "affected", "version": "5.0.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-43782", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T15:01:35.451793Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T15:05:47.174Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "before 3.0.0" }, { "status": "affected", "version": "before 4.4.4" }, { "status": "affected", "version": "before 5.0.3" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "before 3.0.0" }, { "status": "affected", "version": "before 4.4.4" }, { "status": "affected", "version": "before 5.0.3" } ] } ], "credits": [ { "lang": "en", "value": "Ashish Kotha" } ], "descriptions": [ { "lang": "en", "value": "Affected versions of Atlassian Crowd allow an attacker to authenticate as the\u00a0crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd\u0027s REST API under the {{usermanagement}}\u00a0path.\n\nThis vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default.\n\nThe affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3" } ], "problemTypes": [ { "descriptions": [ { "description": "Security Misconfiguration", "lang": "en", "type": "Security Misconfiguration" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-17T00:00:01.315Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://jira.atlassian.com/browse/CWD-5888" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-43782", "datePublished": "2022-11-17T00:00:01.315Z", "dateReserved": "2022-10-26T14:49:11.115Z", "dateUpdated": "2024-10-02T15:05:47.174Z", "requesterUserId": "4ceb4895-2afc-4c29-bf72-c2e04b367c52", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36240
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5685 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5685" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "4.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary File Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-01T16:23:08", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5685" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2021-02-28T00:00:00", "ID": "CVE-2020-36240", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.0.4" }, { "version_affected": "\u003e=", "version_value": "4.1.0" }, { "version_affected": "\u003c", "version_value": "4.1.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary File Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5685", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5685" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2020-36240", "datePublished": "2021-03-01T16:23:08.996989Z", "dateReserved": "2021-01-27T00:00:00", "dateUpdated": "2024-09-17T01:22:12.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18106
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CWD-5061 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5061" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "2.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user\u0027s session provided they can make their identifier hash collide with another user\u0027s session identifier hash." } ], "problemTypes": [ { "descriptions": [ { "description": "Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-29T14:04:53", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5061" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-03-04T00:00:00", "ID": "CVE-2017-18106", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.9.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user\u0027s session provided they can make their identifier hash collide with another user\u0027s session identifier hash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use of a Broken or Risky Cryptographic Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CWD-5061", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5061" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18106", "datePublished": "2019-03-29T14:04:53.177984Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T23:40:45.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-20647 | x_refsource_MISC | |
https://herolab.usd.de/security-advisories/usd-2019-0016/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: unspecified < 6.6.0 |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.3.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "lessThan": "6.10.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:44:03", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-11-08T00:00:00", "ID": "CVE-2019-15005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.0" } ] } }, { "product_name": "Jira Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.3.2" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.0.1" } ] } }, { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.6.0" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Bamboo", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.10.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-20647", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "name": "https://herolab.usd.de/security-advisories/usd-2019-0016/", "refsource": "MISC", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15005", "datePublished": "2019-11-08T03:55:12.611106Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-16T20:31:42.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2926
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/75682 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/49146 | third-party-advisory, x_refsource_SECUNIA | |
http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://osvdb.org/81993 | vdb-entry, x_refsource_OSVDB | |
http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/53595 | vdb-entry, x_refsource_BID | |
http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "fisheye-crucible-xml-dos(75682)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49146" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "fisheye-crucible-xml-dos(75682)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49146" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "fisheye-crucible-xml-dos(75682)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49146" }, { "name": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "name": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "refsource": "OSVDB", "url": "http://osvdb.org/81993" }, { "name": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53595" }, { "name": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2926", "datePublished": "2012-05-22T15:00:00", "dateReserved": "2012-05-22T00:00:00", "dateUpdated": "2024-08-06T19:50:05.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201703-0755
Vulnerability from variot
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. Apache Struts2 Contains a vulnerability that allows the execution of arbitrary code. Apache Struts2 In Jakarta Multipart parser A vulnerability exists in the execution of arbitrary code that could allow the execution of arbitrary code. The attack code for this vulnerability has been released.By processing a request crafted by a remote third party, arbitrary code could be executed with the privileges of the application. Apache Struts 2.3.5 through 2.3.31 and 2.5 through 2.5.10 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03723en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03723en_us Version: 1
HPESBHF03723 rev.1 - HPE Aruba ClearPass Policy Manager, using Apache Struts, Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2017-03-29 Last Updated: 2017-03-29
Potential Security Impact: Remote: Code Execution
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified in HPE Aruba ClearPass Policy Manager.
Note: The ClearPass Policy Manager administrative Web interface is affected by the vulnerability. ClearPass Guest, Insight, and Graphite are NOT impacted.
- Aruba ClearPass Policy Manager All versions prior to 6.6.5
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5638
9.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
9.7 (AV:N/AC:L/Au:N/C:C/I:C/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE Aruba has provided hotfixes for ClearPass 6.6.5, 6.6.4, and 6.5.7. Use one of the following methods to install the appropriate hotfix:
Install the Hotfix Online Using the Software Updates Portal:
-
Open ClearPass Policy Manager and go to Administration - Agents and Software Updates - Software Updates.
-
In the Firmware and Patch Updates area, find the "ClearPass 6.5.7 Hotfix Patch for CVE-2017-5638" or "ClearPass 6.6.4 Hotfix Patch for CVE-2017-5638" patch and click the Download button in its row.
-
Click Install.
-
When the installation is complete and the status is shown as "Needs Restart", proceed to restart ClearPass. After reboot, the status for the patch will be shown as Installed. The ClearPass Policy Manager version number will not change.
Installing the hotfix Offline Using the Patch File from support.arubanetworks.com:
-
Download the "ClearPass 6.5.7 Hotfix Patch for CVE-2017-5638" or "ClearPass 6.6.4 Hotfix Patch for CVE-2017-5638" patch from the Support site.
-
Open the ClearPass Policy Manager Admin UI and go to Administration - Agents and Software Updates - Software Updates.
-
At the bottom of the Firmware and Patch Updates area, click Import Updates and browse to the downloaded patch file. The name and description once imported may differ from the name and remark on the support site as these were adjusted after posting. This is purely a cosmetic discrepancy.
-
Click Install.
-
When the installation is complete and the status is shown as Needs Restart, proceed to restart ClearPass. After reboot, the status for the patch will be shown as Installed. The ClearPass Policy Manager version number will not change.
Workarounds
Restrict access to the Policy Manager Admin Web Interface. This can be accomplished by navigating to Administration - Server Manager - Server Configuration - Server-Name - Network - Restrict Access and only allowing non-public or network management networks.
Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates.
HISTORY Version:1 (rev.1) - 29 March 2017 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQEcBAEBCAAGBQJY3BR/AAoJELXhAxt7SZaiMW8H/0+jWL4Evk+KeqP7aYk1msGp 9ih3F2680VrHVsUbSzul3+svnaWTJUgRe7fUTvsh/Q6bx/Eo86yo8iXGjmzETLtY cTuQrHLySo55Pwua9+89V4e13QkRvQ/UmQPYDMPEk9L7wwU9OF0oCpXHQBuWnw07 mKLZ12HaZqM8vJXgwgJFH77Mf3r5TkGFHsrZ0M+2vvxioJIEfmWV/x4eqtvIy6zS C6CX1M9x4xD442XcFfnH0BHA9RL6LOeYngTPYR7IIycvzpqd8kOWunjs38+IJpFR g49ho/NddeZfDKdJcIdfJ+0f3x2h7FPiVadXu1PzdCckhFHkHmrSlVcRbQZ+1R8= =8ljI -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0755", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "apache struts", "version": null }, { "model": "storwize v5000", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "7.7.1.6" }, { "model": "weblogic server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.2.1.2.0" }, { "model": "storwize v7000", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "7.8.1.0" }, { "model": "server automation", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "10.2.0" }, { "model": "struts", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "2.2.3" }, { "model": "storwize v3500", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "7.7.1.6" }, { "model": "server automation", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "10.1.0" }, { "model": "server automation", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "10.5.0" }, { "model": "oncommand balance", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "storage v5030", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": "7.7.1.6" }, { "model": "storwize v5000", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "7.8.1.0" }, { "model": "storwize v3500", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "7.8.1.0" }, { "model": "weblogic server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.1.3.0.0" }, { "model": "storage v5030", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": "7.8.1.0" }, { "model": "server automation", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "9.1.0" }, { "model": "server automation", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "10.0.0" }, { "model": "struts", "scope": "lt", "trust": 1.0, "vendor": "apache", "version": "2.3.32" }, { "model": "storwize v7000", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": "7.7.1.6" }, { "model": "clearpass policy manager", "scope": "lt", "trust": 1.0, "vendor": "arubanetworks", "version": "6.6.5" }, { "model": "struts", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "2.5.0" }, { "model": "struts", "scope": "lt", "trust": 1.0, "vendor": "apache", "version": "2.5.10.1" }, { "model": "weblogic server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.2.1.1.0" }, { "model": "weblogic server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "10.3.6.0.0" }, { "model": "struts", "scope": "eq", "trust": 0.9, "vendor": "apache", "version": "2.3.30" }, { "model": "struts", "scope": "eq", "trust": 0.9, "vendor": "apache", "version": "2.5.8" }, { "model": "struts", "scope": "eq", "trust": 0.9, "vendor": "apache", "version": "2.5.7" }, { "model": "struts", "scope": "eq", "trust": 0.9, "vendor": "apache", "version": "2.5.5" }, { "model": "struts", "scope": "eq", "trust": 0.9, "vendor": "apache", "version": "2.5.2" }, { "model": "struts", "scope": "eq", "trust": 0.9, "vendor": "apache", "version": "2.5.10" }, { "model": "struts", "scope": "lte", "trust": 0.8, "vendor": "apache", "version": "2.3.5 from 2.3.31" }, { "model": "struts", "scope": "lte", "trust": 0.8, "vendor": "apache", "version": "2.5 from 2.5.10" }, { "model": "esmpro/servermanager", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "6.10 to 6.16" }, { "model": "infoframe relational store", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": null }, { "model": "istorage", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "hs series 5.0.5" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v4.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v5.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v5.1" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "standard v4.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "standard v5.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "standard v5.1" }, { "model": "webotx developer", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "\"(with developers studio) v9.3\"" }, { "model": "webotx developer", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "\"(with developers studio) v9.4\"" }, { "model": "hirdb", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "server version 9" }, { "model": "hirdb control manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- server version 9" }, { "model": "struts", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "2.5.4" }, { "model": "struts", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "2.5.3" }, { "model": "struts", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "2.5.6" }, { "model": "struts", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "2.5.9" }, { "model": "vrealize operations manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "vrealize hyperic", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.5" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "horizon desktop as-a-service platform", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.0" }, { "model": "horizon desktop as-a-service platform", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.18.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.2.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.1.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.0.0" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.4" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2.1" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.3.0" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "smsgw v100r003c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smsgw v100r002c11", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smsgw v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secospace antiddos8030 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c91", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "6000" }, { "model": "imanager neteco v600r007c90", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "6000" }, { "model": "imanager neteco v600r007c80", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "6000" }, { "model": "imanager neteco v600r008c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r008c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r008c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c60spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c50", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c11", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v300r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v200r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "universal cmdb foundation software cup5", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.22" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.16" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.15" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.14" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.13" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.12" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.10" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.50" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.20" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.10" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.02" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.01" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.00" }, { "model": "virtualized voice browser", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unity connection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified sip proxy software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified intelligent contact management enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified intelligence center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified contact center express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified contact center enterprise live data server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "unified contact center enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified communications manager im \u0026 presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "socialminer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime service catalog appliance and virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "packaged contact center enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "hosted collaboration solution for contact center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "finesse", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "emergency responder", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "hipchat server", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.0" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.11" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.10.1" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.5" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.4" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.3" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.2" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.1" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.8.8" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.8.3" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.15" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.12" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.11" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.10" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.1" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.12.3.1" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.11.4.1" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.31" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.28" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.24" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.5" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.5.1" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.5" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.8" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.7" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.29" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.20" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.16" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.15" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.14" }, { "model": "struts", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.3.12" }, { "model": "vcenter server 6.5b", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": null }, { "model": "sterling selling and fulfillment foundation 9.5.0-sfp2", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sterling selling and fulfillment foundation 9.4.0-sfp3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sterling selling and fulfillment foundation 9.3.0-sfp5", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sterling selling and fulfillment foundation sfp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.2.1-" }, { "model": "sterling selling and fulfillment foundation sfp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.2.0-" }, { "model": "sterling selling and fulfillment foundation sfp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.0-" }, { "model": "virtualized voice browser su1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "unity connection", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.0" }, { "model": "unity connection", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "unity connection", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "unified sip proxy software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.1" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0(2)" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5(3)" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "unified intelligence center es03", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "unified contact center express su1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-11.5(1)" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-11.0(2)" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-10.5(3)" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-10.0(2)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0(2)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5(3)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "socialminer su1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "prime license manager 11.5 su1a", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "mediasense", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0(2)" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5(3)" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "finesse es2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "hipchat server", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.2.2" }, { "model": "crowd", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.11.1" }, { "model": "crowd", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.10.3" }, { "model": "crowd", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.9.7" }, { "model": "bamboo", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "5.15.3" }, { "model": "bamboo", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "5.14.5" }, { "model": "struts", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "2.5.10.1" }, { "model": "struts", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "2.3.32" } ], "sources": [ { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apache:struts", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:esmpro_servermanager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:infoframe_relational_store", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:istorage", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:staroffice_x", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:webotx_developer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:hirdb", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:hirdb_control_manager", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001621" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nike Zheng", "sources": [ { "db": "BID", "id": "96729" } ], "trust": 0.3 }, "cve": "CVE-2017-5638", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2017-5638", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT DEFINED", "baseScore": 10.0, "collateralDamagePotential": "NONE", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 8.7, "exploitability": "HIGH", "exploitabilityScore": 10.0, "id": "CVE-2017-5638", "impactScore": 10.0, "integrityImpact": "COMPLETE", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "HIGH", "targetDistribution": "HIGH", "trust": 1.6, "userInteractionRequired": null, "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-5638", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-5638", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-5638", "trust": 1.6, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2017-5638", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-5638", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201703-152", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2017-5638", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. Apache Struts2 Contains a vulnerability that allows the execution of arbitrary code. Apache Struts2 In Jakarta Multipart parser A vulnerability exists in the execution of arbitrary code that could allow the execution of arbitrary code. The attack code for this vulnerability has been released.By processing a request crafted by a remote third party, arbitrary code could be executed with the privileges of the application. \nApache Struts 2.3.5 through 2.3.31 and 2.5 through 2.5.10 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03723en_us\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: hpesbhf03723en_us\nVersion: 1\n\nHPESBHF03723 rev.1 - HPE Aruba ClearPass Policy Manager, using Apache Struts,\nRemote Code Execution\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2017-03-29\nLast Updated: 2017-03-29\n\nPotential Security Impact: Remote: Code Execution\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified in HPE Aruba ClearPass\nPolicy Manager. \n\n**Note:** The ClearPass Policy Manager administrative Web interface is\naffected by the vulnerability. ClearPass Guest, Insight, and Graphite are NOT\nimpacted. \n\n - Aruba ClearPass Policy Manager All versions prior to 6.6.5\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2017-5638\n 9.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\n 9.7 (AV:N/AC:L/Au:N/C:C/I:C/A:P)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE Aruba has provided hotfixes for ClearPass 6.6.5, 6.6.4, and 6.5.7. Use\none of the following methods to install the appropriate hotfix:\n\nInstall the Hotfix Online Using the Software Updates Portal:\n \n 1. Open ClearPass Policy Manager and go to Administration - Agents and\nSoftware\n Updates - Software Updates. \n \n 2. In the Firmware and Patch Updates area, find the \"ClearPass 6.5.7\nHotfix\n Patch for CVE-2017-5638\" or \"ClearPass 6.6.4 Hotfix Patch for\nCVE-2017-5638\"\n patch and click the Download button in its row. \n \n 3. Click Install. \n \n 4. When the installation is complete and the status is shown as \"Needs\n Restart\", proceed to restart ClearPass. After reboot, the status for the\n patch will be shown as Installed. The ClearPass Policy Manager version\n number will not change. \n\n \nInstalling the hotfix Offline Using the Patch File from\nsupport.arubanetworks.com:\n \n 1. Download the \"ClearPass 6.5.7 Hotfix Patch for CVE-2017-5638\" or\n \"ClearPass 6.6.4 Hotfix Patch for CVE-2017-5638\" patch from the Support\nsite. \n \n 2. Open the ClearPass Policy Manager Admin UI and go to Administration -\n Agents and Software Updates - Software Updates. \n 3. At the bottom of the Firmware and Patch Updates area, click Import\nUpdates\n and browse to the downloaded patch file. The name and description once\n imported may differ from the name and remark on the support site\n as these were adjusted after posting. This is purely a cosmetic\ndiscrepancy. \n \n 4. Click Install. \n \n 5. When the installation is complete and the status is shown as Needs\nRestart,\n proceed to restart ClearPass. After reboot, the status for the patch will\n be shown as Installed. The ClearPass Policy Manager version number will\n not change. \n\n\nWorkarounds\n- ----------- \nRestrict access to the Policy Manager Admin Web Interface. This can be\naccomplished by navigating to Administration - Server Manager -\nServer Configuration - Server-Name - Network - Restrict Access and\nonly allowing non-public or network management networks. \n\n**Note:** Please contact HPE Technical Support if any assistance is needed\nacquiring the software updates. \n\nHISTORY\nVersion:1 (rev.1) - 29 March 2017 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQEcBAEBCAAGBQJY3BR/AAoJELXhAxt7SZaiMW8H/0+jWL4Evk+KeqP7aYk1msGp\n9ih3F2680VrHVsUbSzul3+svnaWTJUgRe7fUTvsh/Q6bx/Eo86yo8iXGjmzETLtY\ncTuQrHLySo55Pwua9+89V4e13QkRvQ/UmQPYDMPEk9L7wwU9OF0oCpXHQBuWnw07\nmKLZ12HaZqM8vJXgwgJFH77Mf3r5TkGFHsrZ0M+2vvxioJIEfmWV/x4eqtvIy6zS\nC6CX1M9x4xD442XcFfnH0BHA9RL6LOeYngTPYR7IIycvzpqd8kOWunjs38+IJpFR\ng49ho/NddeZfDKdJcIdfJ+0f3x2h7FPiVadXu1PzdCckhFHkHmrSlVcRbQZ+1R8=\n=8ljI\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2017-5638" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "BID", "id": "96729" }, { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" } ], "trust": 3.6 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/834067", "trust": 1.6, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=41570", "trust": 0.2, "type": "exploit" } ], "sources": [ { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "VULMON", "id": "CVE-2017-5638" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5638", "trust": 4.6 }, { "db": "CERT/CC", "id": "VU#834067", "trust": 4.3 }, { "db": "EXPLOIT-DB", "id": "41570", "trust": 3.2 }, { "db": "BID", "id": "96729", "trust": 1.9 }, { "db": "EXPLOIT-DB", "id": "41614", "trust": 1.6 }, { "db": "SECTRACK", "id": "1037973", "trust": 1.6 }, { "db": "LENOVO", "id": "LEN-14200", "trust": 1.6 }, { "db": "PACKETSTORM", "id": "141494", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU93610402", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-001621", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201703-152", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-5638", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "142055", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141863", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "id": "VAR-201703-0755", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5 }, "last_update_date": "2024-11-23T22:45:45.952000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WW-3025", "trust": 0.8, "url": "https://issues.apache.org/jira/browse/WW-3025" }, { "title": "Alternate Libraries", "trust": 0.8, "url": "https://cwiki.apache.org/confluence/display/WW/File+Upload#FileUpload-AlternateLibraries" }, { "title": "S2-045: Possible Remote Code Execution when performing file upload based on Jakarta Multipart parser.", "trust": 0.8, "url": "https://struts.apache.org/docs/s2-045.html" }, { "title": "Uses default error key if specified key doesn\u0027t exist (3523064)", "trust": 0.8, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a" }, { "title": "Uses default error key if specified key doesn\u0027t exist (6b8272c)", "trust": 0.8, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228" }, { "title": "Content-Type: Malicious - New Apache Struts2 0-day Under Attack", "trust": 0.8, "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "title": "hitachi-sec-2017-110", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-110/index.html" }, { "title": "NV17-013", "trust": 0.8, "url": "http://jpn.nec.com/security-info/secinfo/nv17-013.html" }, { "title": "hitachi-sec-2017-110", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/hitachi-sec-2017-110/index.html" }, { "title": "Veritas NetBackup: \u4efb\u610f\u306e\u30b3\u30de\u30f3\u30c9\u304c\u5b9f\u884c\u3055\u308c\u308b\u8106\u5f31\u6027(CVE-2017-5638) (2017\u5e749\u67081\u65e5)", "trust": 0.8, "url": "http://www.fujitsu.com/jp/products/software/resources/condition/security/products-fujitsu/solution/veritas201712.html" }, { "title": "Apache Struts 2 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67948" }, { "title": "Cisco: Apache Struts2 Jakarta Multipart Parser File Upload Code Execution Vulnerability Affecting Cisco Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20170310-struts2" }, { "title": "CVE-2017-5638", "trust": 0.1, "url": "https://github.com/readloud/CVE-2017-5638 " }, { "title": "cve-2017-5638", "trust": 0.1, "url": "https://github.com/jrrdev/cve-2017-5638 " }, { "title": "apache-struts-v2-CVE-2017-5638", "trust": 0.1, "url": "https://github.com/cafnet/apache-struts-v2-CVE-2017-5638 " }, { "title": "struts-vulnerability-demo", "trust": 0.1, "url": "https://github.com/corpbob/struts-vulnerability-demo " }, { "title": "struts2_cve-2017-5638", "trust": 0.1, "url": "https://github.com/m3ssap0/struts2_cve-2017-5638 " }, { "title": "struts-rce-cve-2017-5638", "trust": 0.1, "url": "https://github.com/riyazwalikar/struts-rce-cve-2017-5638 " }, { "title": "equifax-data-breach", "trust": 0.1, "url": "https://github.com/raul23/equifax-data-breach " }, { "title": "CVE-2017-5638", "trust": 0.1, "url": "https://github.com/colorblindpentester/CVE-2017-5638 " }, { "title": "struts2-rce", "trust": 0.1, "url": "https://github.com/sotudeko/struts2-rce " }, { "title": "vuln-struts2-vm", "trust": 0.1, "url": "https://github.com/evolvesecurity/vuln-struts2-vm " }, { "title": "Apache-Struts-2-CVE-2017-5638-Exploit", "trust": 0.1, "url": "https://github.com/dock0d1/Apache-Struts-2-CVE-2017-5638-Exploit " }, { "title": "struts2-rce", "trust": 0.1, "url": "https://github.com/rjd3/struts2-rce " }, { "title": "Struts2-045-RCE", "trust": 0.1, "url": "https://github.com/RayScri/Struts2-045-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "CNNVD", "id": "CNNVD-201703-152" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://cwiki.apache.org/confluence/display/ww/s2-045" }, { "trust": 3.2, "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "trust": 3.2, "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "trust": 3.2, "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "trust": 2.7, "url": "https://www.kb.cert.org/vuls/id/834067" }, { "trust": 1.9, "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "trust": 1.6, "url": "https://github.com/rapid7/metasploit-framework/issues/8064 " }, { "trust": 1.6, "url": "https://www.exploit-db.com/exploits/41570/" }, { "trust": 1.6, "url": "https://cwe.mitre.org/data/definitions/94.html" }, { "trust": 1.6, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-002.txt" }, { "trust": 1.6, "url": "https://cwiki.apache.org/confluence/display/ww/s2-046" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/96729" }, { "trust": 1.6, "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "trust": 1.6, "url": "https://www.symantec.com/security-center/network-protection-security-advisories/sa145" }, { "trust": 1.6, "url": "https://exploit-db.com/exploits/41570" }, { "trust": 1.6, "url": "https://packetstormsecurity.com/files/141494/s2-45-poc.py.txt" }, { "trust": 1.6, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "trust": 1.6, "url": "https://github.com/mazen160/struts-pwn" }, { "trust": 1.6, "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "trust": 1.6, "url": "https://struts.apache.org/docs/s2-046.html" }, { "trust": 1.6, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbgn03733en_us" }, { "trust": 1.6, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03723en_us" }, { "trust": 1.6, "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "trust": 1.6, "url": "https://twitter.com/theog150/status/841146956135124993" }, { "trust": 1.6, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbgn03749en_us" }, { "trust": 1.6, "url": "https://www.exploit-db.com/exploits/41614/" }, { "trust": 1.6, "url": "https://struts.apache.org/docs/s2-045.html" }, { "trust": 1.6, "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1037973" }, { "trust": 1.6, "url": "https://isc.sans.edu/diary/22169" }, { "trust": 1.0, "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3cannounce.apache.org%3e" }, { "trust": 1.0, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3ba=commit%3bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3cannounce.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3cannounce.apache.org%3e" }, { "trust": 1.0, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3ba=commit%3bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5638" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20170308-struts.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2017/at170009.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu93610402/index.html" }, { "trust": 0.8, "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-5638" }, { "trust": 0.6, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "http-vuln-cve2017-5638.html" }, { "trust": 0.6, "url": "https://nmap.org/nsedoc/scripts/" }, { "trust": 0.6, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20170316-01-struts2-cn" }, { "trust": 0.4, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03733en_us" }, { "trust": 0.3, "url": "http://www.apache.org/" }, { "trust": 0.3, "url": "http://struts.apache.org/" }, { "trust": 0.3, "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-03-10-876857850.html" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430326" }, { "trust": 0.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170310-struts2" }, { "trust": 0.3, "url": "https://confluence.atlassian.com/crowd/crowd-security-advisory-2017-03-10-876857916.html" }, { "trust": 0.3, "url": "https://confluence.atlassian.com/display/hc/hipchat+server+security+advisory+2017-03-09" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03749en_us" }, { "trust": 0.3, "url": "http://www.huawei.com/en/psirt/security-notices/2017/huawei-sn-20170313-01-struts2-en" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22000444" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22001736" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2017-0004.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5638" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03723en_us" } ], "sources": [ { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" }, { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-14T00:00:00", "db": "CERT/CC", "id": "VU#834067" }, { "date": "2017-03-14T00:00:00", "db": "CERT/CC", "id": "VU#834067" }, { "date": "2017-03-11T00:00:00", "db": "VULMON", "id": "CVE-2017-5638" }, { "date": "2017-03-06T00:00:00", "db": "BID", "id": "96729" }, { "date": "2017-03-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "date": "2017-04-07T18:18:00", "db": "PACKETSTORM", "id": "142055" }, { "date": "2017-03-30T16:04:25", "db": "PACKETSTORM", "id": "141863" }, { "date": "2017-03-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-152" }, { "date": "2017-03-11T02:59:00.150000", "db": "NVD", "id": "CVE-2017-5638" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-14T00:00:00", "db": "CERT/CC", "id": "VU#834067" }, { "date": "2017-03-14T00:00:00", "db": "CERT/CC", "id": "VU#834067" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2017-5638" }, { "date": "2017-05-26T07:00:00", "db": "BID", "id": "96729" }, { "date": "2017-10-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "date": "2021-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-152" }, { "date": "2024-11-21T03:28:04.340000", "db": "NVD", "id": "CVE-2017-5638" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-152" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache Struts 2 is vulnerable to remote code execution", "sources": [ { "db": "CERT/CC", "id": "VU#834067" }, { "db": "CERT/CC", "id": "VU#834067" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "96729" }, { "db": "CNNVD", "id": "CNNVD-201703-152" } ], "trust": 0.9 } }