// For flags

CVE-2019-13347

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in the SAML Single Sign On (SSO) plugin for several Atlassian products affecting versions 3.1.0 through 3.2.2 for Jira and Confluence, versions 2.4.0 through 3.0.3 for Bitbucket, and versions 2.4.0 through 2.5.2 for Bamboo. It allows locally disabled users to reactivate their accounts just by browsing the affected Jira/Confluence/Bitbucket/Bamboo instance, even when the applicable configuration option of the plugin has been disabled ("Reactivate inactive users"). Exploiting this vulnerability requires an attacker to be authorized by the identity provider and requires that the plugin's configuration option "User Update Method" have the "Update from SAML Attributes" value.

Se detectó un problema en el plugin SAML Single Sign On (SSO) para varios productos Atlassian que afectan las versiones 3.1.0 hasta 3.2.2 para Jira y Confluence, las versiones 2.4.0 hasta 3.0.3 para Bitbucket y las versiones 2.4.0 hasta 2.5 .2 para Bamboo. Permite a usuarios deshabilitados localmente reactivar sus cuentas simplemente explorando la instancia de Jira/Confluence/Bitbucket/Bamboo afectada, incluso cuando la opción de configuración aplicable del plugin ha sido desactivada ("Reactivate inactive users"). La explotación de esta vulnerabilidad requiere que un atacante esté autorizado por el proveedor de identidad y que la opción de configuración del plugin "User Update Method" tenga el valor "Update from SAML Attributes".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-05 CVE Reserved
  • 2019-12-13 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Atlassian
Search vendor "Atlassian"
Saml Single Sign On
Search vendor "Atlassian" for product "Saml Single Sign On"
>= 2.4.0 <= 3.0.3
Search vendor "Atlassian" for product "Saml Single Sign On" and version " >= 2.4.0 <= 3.0.3"
bamboo
Affected
Atlassian
Search vendor "Atlassian"
Saml Single Sign On
Search vendor "Atlassian" for product "Saml Single Sign On"
>= 2.4.0 <= 3.0.3
Search vendor "Atlassian" for product "Saml Single Sign On" and version " >= 2.4.0 <= 3.0.3"
bitbucket
Affected
Atlassian
Search vendor "Atlassian"
Saml Single Sign On
Search vendor "Atlassian" for product "Saml Single Sign On"
>= 3.1.0 <= 3.2.2
Search vendor "Atlassian" for product "Saml Single Sign On" and version " >= 3.1.0 <= 3.2.2"
confluence
Affected
Atlassian
Search vendor "Atlassian"
Saml Single Sign On
Search vendor "Atlassian" for product "Saml Single Sign On"
>= 3.1.0 <= 3.2.2
Search vendor "Atlassian" for product "Saml Single Sign On" and version " >= 3.1.0 <= 3.2.2"
jira
Affected