CVE-2019-11580

Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163810/Atlassian-Crowd-pdkinstall-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/108637 - Broken Link () http://www.securityfocus.com/bid/108637 - Broken Link
References () https://jira.atlassian.com/browse/CWD-5388 - Mitigation, Issue Tracking, Vendor Advisory () https://jira.atlassian.com/browse/CWD-5388 - Issue Tracking, Mitigation, Vendor Advisory

Information

Published : 2019-06-03 14:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11580

Mitre link : CVE-2019-11580

CVE.ORG link : CVE-2019-11580


JSON object : View

Products Affected

atlassian

  • crowd