CVE-2018-20238

Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
References
Link Resource
http://www.securityfocus.com/bid/107036 Third Party Advisory VDB Entry
https://jira.atlassian.com/browse/CWD-5361 Vendor Advisory
http://www.securityfocus.com/bid/107036 Third Party Advisory VDB Entry
https://jira.atlassian.com/browse/CWD-5361 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/107036 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/107036 - Third Party Advisory, VDB Entry
References () https://jira.atlassian.com/browse/CWD-5361 - Vendor Advisory () https://jira.atlassian.com/browse/CWD-5361 - Vendor Advisory

Information

Published : 2019-02-13 18:29

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20238

Mitre link : CVE-2018-20238

CVE.ORG link : CVE-2018-20238


JSON object : View

Products Affected

atlassian

  • crowd
CWE
CWE-384

Session Fixation