First published: Wed Jan 31 2018(Updated: )
The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Crowd | >=1.5.0<3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16858 is a vulnerability in the 'crowd-application' plugin module of Atlassian Crowd that allows an attacker to impersonate a user in REST requests.
CVE-2017-16858 allows an attacker to impersonate a Crowd user in REST requests from version 1.5.0 to 3.1.2 of Atlassian Crowd.
CVE-2017-16858 has a severity rating of 6.8 (Medium).
To fix CVE-2017-16858, upgrade Atlassian Crowd to version 3.1.2 or newer.
You can find more information about CVE-2017-16858 in the Atlassian Jira issue CWD-5009.