{ "schema_version": "1.4.0", "id": "GHSA-j835-6ff4-p3mc", "modified": "2022-11-18T21:30:18Z", "published": "2022-11-17T03:30:49Z", "aliases": [ "CVE-2022-43782" ], "details": "Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43782" }, { "type": "WEB", "url": "https://jira.atlassian.com/browse/CWD-5888" } ], "database_specific": { "cwe_ids": [ "CWE-287" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-11-17T00:15:00Z" } }