Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107036 | Third Party Advisory VDB Entry |
https://jira.atlassian.com/browse/CWD-5361 | Vendor Advisory |
http://www.securityfocus.com/bid/107036 | Third Party Advisory VDB Entry |
https://jira.atlassian.com/browse/CWD-5361 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107036 - Third Party Advisory, VDB Entry | |
References | () https://jira.atlassian.com/browse/CWD-5361 - Vendor Advisory |
Information
Published : 2019-02-13 18:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20238
Mitre link : CVE-2018-20238
CVE.ORG link : CVE-2018-20238
JSON object : View
Products Affected
atlassian
- crowd
CWE
CWE-384
Session Fixation