Atlassian Crowd vulnerabilities

24 known vulnerabilities affecting atlassian/crowd.

Total CVEs
24
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL5HIGH10MEDIUM9

Vulnerabilities

Page 1 of 2
CVE-2026-21569HIGHCVSS 7.9≥ 7.1.0, < 7.1.32026-01-28
CVE-2026-21569 [HIGH] CWE-611 CVE-2026-21569: This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server. This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated attacker to access local and remote content which has high impact to confidentiality, low impact to integrity, h
nvd
CVE-2023-22521HIGHCVSS 8.8≥ 3.4.0, < 5.1.6v5.2.02023-11-21
CVE-2023-22521 [HIGH] CVE-2023-22521: This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.6 of Crow This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.6 of Crowd Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.0, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and
nvd
CVE-2022-43782CRITICALCVSS 9.8≥ 3.0.0, < 4.4.4≥ 5.0.0, < 5.0.32022-11-17
CVE-2022-43782 [CRITICAL] CVE-2022-43782: Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses conf
nvd
CVE-2022-26136CRITICALCVSS 9.8fixed in 4.3.8≥ 4.4.0, < 4.4.2+1 more2022-07-20
CVE-2022-26136 [CRITICAL] CWE-180 CVE-2022-26136: A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass S A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released update
nvd
CVE-2022-26137HIGHCVSS 8.8fixed in 4.3.8≥ 4.4.0, < 4.4.2+1 more2022-07-20
CVE-2022-26137 [HIGH] CWE-180 CVE-2022-26137: A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause ad A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a speci
nvd
CVE-2020-36240MEDIUMCVSS 5.3fixed in 4.0.4≥ 4.1.0, < 4.1.2+3 more2021-03-01
CVE-2020-36240 [MEDIUM] CVE-2020-36240: The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4 The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
cvelistv5nvd
CVE-2019-20902HIGHCVSS 7.5fixed in 3.4.6≥ 3.5.0, < 3.5.1+3 more2020-10-01
CVE-2019-20902 [HIGH] CVE-2019-20902: Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected ver Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.
cvelistv5nvd
CVE-2019-20104HIGHCVSS 7.5fixed in 3.2.11≥ 3.3.0, < 3.3.8+8 more2020-02-06
CVE-2019-20104 [HIGH] CWE-776 CVE-2019-20104: The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote attackers to perform a Denial of Service attack via an XML Entity Expansion vulnerability.
cvelistv5nvd
CVE-2017-18107MEDIUMCVSS 6.5fixed in 3.1.1≥ unspecified, < 3.1.12019-12-17
CVE-2017-18107 [MEDIUM] CWE-352 CVE-2017-18107: Various resources in the Crowd Demo application of Atlassian Crowd before version 3.1.1 allow remote Various resources in the Crowd Demo application of Atlassian Crowd before version 3.1.1 allow remote attackers to modify add, modify and delete users & groups via a Cross-site request forgery (CSRF) vulnerability. Please be aware that the Demo application is not enabled by default.
cvelistv5nvd
CVE-2019-15005MEDIUMCVSS 4.3fixed in 3.6.0≥ unspecified, < 3.6.02019-11-08
CVE-2019-15005 [MEDIUM] CWE-862 CVE-2019-15005: The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivilege The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulne
cvelistv5nvd
CVE-2019-11580CRITICALCVSS 9.8KEVPoC≥ 2.1.0, < 3.0.5≥ 3.1.0, < 3.1.6+13 more2019-06-03
CVE-2019-11580 [CRITICAL] CVE-2019-11580: Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in r Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version
cvelistv5nvd
CVE-2018-20239MEDIUMCVSS 5.4fixed in 3.4.32019-04-30
CVE-2018-20239 [MEDIUM] CWE-79 CVE-2018-20239: Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a pl
nvd
CVE-2017-18108HIGHCVSS 7.2fixed in 2.10.2≥ unspecified, < 2.10.22019-03-29
CVE-2017-18108 [HIGH] CWE-94 CVE-2017-18108: The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remot The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection.
cvelistv5nvd
CVE-2017-18106HIGHCVSS 7.5fixed in 2.9.1≥ unspecified, < 2.9.12019-03-29
CVE-2017-18106 [HIGH] CWE-287 CVE-2017-18106: The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially co The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can mak
cvelistv5nvd
CVE-2017-18105HIGHCVSS 8.1fixed in 3.0.2≥ 3.1.0, < 3.1.1+3 more2019-03-29
CVE-2017-18105 [HIGH] CWE-384 CVE-2017-18105: The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before ver The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability.
cvelistv5nvd
CVE-2017-18110MEDIUMCVSS 6.5fixed in 3.0.2v3.1.0+3 more2019-03-29
CVE-2017-18110 [MEDIUM] CWE-611 CVE-2017-18110: The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability.
cvelistv5nvd
CVE-2017-18109MEDIUMCVSS 6.1fixed in 3.0.2v3.1.0+3 more2019-03-29
CVE-2017-18109 [MEDIUM] CWE-601 CVE-2017-18109: The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect.
cvelistv5nvd
CVE-2018-20238HIGHCVSS 8.1fixed in 3.2.7≥ 3.3.0, < 3.3.4+3 more2019-02-13
CVE-2018-20238 [HIGH] CWE-384 CVE-2018-20238: Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
cvelistv5nvd
CVE-2016-10740MEDIUMCVSS 4.9fixed in 2.10.12019-01-29
CVE-2016-10740 [MEDIUM] CWE-200 CVE-2016-10740: Various resources in Atlassian Crowd before version 2.10.1 allow remote attackers with administratio Various resources in Atlassian Crowd before version 2.10.1 allow remote attackers with administration rights to learn the passwords of configured LDAP directories by examining the responses to requests for these resources.
nvd
CVE-2017-16858MEDIUMCVSS 6.8≥ 1.5.0, < 3.1.2vfrom 1.5.0 before 3.1.22018-01-31
CVE-2017-16858 [MEDIUM] CWE-863 CVE-2017-16858: The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd fr The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is boun
cvelistv5nvd
Atlassian Crowd vulnerabilities | cvebase