Логотип exploitDog
bind:CVE-2022-43782
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-43782

Количество 3

Количество 3

nvd логотип

CVE-2022-43782

около 3 лет назад

Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-j835-6ff4-p3mc

около 3 лет назад

Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2022-06964

около 3 лет назад

Уязвимость прикладного программного интерфейса REST программного продукта обработки данных Atlassian Crowd, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-43782

Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3

CVSS3: 9.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-j835-6ff4-p3mc

Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3

CVSS3: 9.8
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2022-06964

Уязвимость прикладного программного интерфейса REST программного продукта обработки данных Atlassian Crowd, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
1%
Низкий
около 3 лет назад

Уязвимостей на страницу