Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: atlassian

Published: 2022-11-17T00:00:01.315Z

Updated: 2024-08-03T13:40:06.314Z

Reserved: 2022-10-26T14:49:11.115Z

Link: CVE-2022-43782

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-11-17T00:15:18.640

Modified: 2023-11-07T03:54:03.560

Link: CVE-2022-43782

cve-icon Redhat

No data.