First published: Thu Nov 17 2022(Updated: )
Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Crowd | >=3.0.0<4.4.4 | |
Atlassian Crowd | >=5.0.0<5.0.3 | |
>=3.0.0<4.4.4 | ||
>=5.0.0<5.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43782 is a vulnerability in Atlassian Crowd that allows an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API.
Versions 3.0.0 to 4.4.4 of Atlassian Crowd are affected by CVE-2022-43782.
CVE-2022-43782 has a severity rating of critical with a CVSS score of 9.8.
An attacker can exploit CVE-2022-43782 by leveraging security misconfiguration and making privileged calls to Crowd's REST API.
Yes, upgrading Atlassian Crowd to a version higher than 4.4.4 or 5.0.3 will fix CVE-2022-43782.