Atlassian Crowd < 2.5.3 Information Disclosure

medium Nessus Network Monitor Plugin ID 9902

Synopsis

The remote web server hosts an application that is vulnerable to an information disclosure attack vector.

Description

The version of Crowd installed on the remote host is earlier than 2.5.3 and is affected by a flaw that is due to the crowd 500 error page ('crowd/console/500.jsp') displaying the 'crowd.token_key cookie', even though it's set to HttpOnly. This may allow a remote attacker to gain access to sensitive information.

Solution

Update to Crowd version 2.5.3 or later.

See Also

https://jira.atlassian.com/browse/CWD-2950

Plugin Details

Severity: Medium

ID: 9902

Family: CGI

Published: 1/23/2017

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:crowd

Patch Publication Date: 12/5/2012

Vulnerability Publication Date: 10/17/2012