
CVE-2017-18110
https://notcve.org/view.php?id=CVE-2017-18110
29 Mar 2019 — The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability. El recurso de administración de copias de memoria en Atlassian Crowd, en versiones anteriores a la 3.0.2 y desde la 3.1.1, permite a los atacantes remotos leer archivos desde el sistema de archivos mediante una vulnerabilidad de XEE (XML External Entity). • https://jira.atlassian.com/browse/CWD-5070 • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2017-18109
https://notcve.org/view.php?id=CVE-2017-18109
29 Mar 2019 — The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect. El recurso de inicio de sesión de Crowdld en Atlassian Crowd, en versiones anteriores a la 3.0.2 y desde la 3.1.0 hasta la 3.1.1, permite a los atacantes remotos redirigir a los usuarios a otro sitio web que pueden utilizar como parte de la realización... • https://jira.atlassian.com/browse/CWD-5071 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2017-18105
https://notcve.org/view.php?id=CVE-2017-18105
29 Mar 2019 — The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability. El recurso de inicio de sesión en consola de Atlassian Crowd, en versiones anteriores a la 3.0.2, y desde la 3.1.0 hasta la 3.1.1, permite a los atacantes que hayan obtenido previamente la cookie JSE... • https://jira.atlassian.com/browse/CWD-5072 • CWE-384: Session Fixation •

CVE-2018-20238
https://notcve.org/view.php?id=CVE-2018-20238
13 Feb 2019 — Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability. Varios recursos REST en Atlassian Crowd, en versiones anteriores a la 3.2.7 y desde la versión 3.3.0 antes de la 3.3.4, podrían permitir que los atacantes remotos se autentiquen mediante una sesión de usuario caducada mediante una vulnerabilidad de expiración de sesión insuficiente... • http://www.securityfocus.com/bid/107036 • CWE-384: Session Fixation •

CVE-2017-16858
https://notcve.org/view.php?id=CVE-2017-16858
31 Jan 2018 — The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to auth... • https://jira.atlassian.com/browse/CWD-5009 • CWE-287: Improper Authentication CWE-863: Incorrect Authorization •