First published: Mon Mar 01 2021(Updated: )
The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Crowd | <4.0.4 | |
Atlassian Crowd | >=4.1.0<4.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-36240.
The title of this vulnerability is 'The ResourceDownloadRewriteRule class in Crowd before version 4.0.4 and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.'
The description of this vulnerability is that the ResourceDownloadRewriteRule class in Crowd versions before 4.0.4 and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
The Atlassian Crowd software versions before 4.0.4 and from version 4.1.0 before 4.1.2 are affected by this vulnerability.
The severity of CVE-2020-36240 is medium with a CVSS score of 5.3.
Yes, you can find more information about this vulnerability at the following link: [CVE-2020-36240](https://jira.atlassian.com/browse/CWD-5685).
To fix this vulnerability, it is recommended to update Atlassian Crowd to version 4.0.4 or 4.1.2.