First published: Fri Dec 09 2016(Updated: )
The LDAP directory connector in Atlassian Crowd before 2.8.8 and 2.9.x before 2.9.5 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Crowd | <=2.8.4 | |
Atlassian Crowd | =2.9.0 | |
Atlassian Crowd | =2.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6496 is classified as high severity due to the potential for remote code execution.
To fix CVE-2016-6496, upgrade to Atlassian Crowd versions 2.8.8 or 2.9.5 and later.
CVE-2016-6496 allows remote attackers to execute arbitrary code through LDAP entry poisoning.
Atlassian Crowd versions prior to 2.8.8 and 2.9.0 through 2.9.1 are affected by CVE-2016-6496.
Yes, CVE-2016-6496 can be exploited without authentication, making it a critical vulnerability.