Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default.
The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
                
            References
                    | Link | Resource | 
|---|---|
| https://jira.atlassian.com/browse/CWD-5888 | Issue Tracking Patch Vendor Advisory | 
| https://jira.atlassian.com/browse/CWD-5888 | Issue Tracking Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2022-11-17 00:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-43782
Mitre link : CVE-2022-43782
CVE.ORG link : CVE-2022-43782
JSON object : View
Products Affected
                atlassian
- crowd
 
CWE
                