Atlassian Crowd 2.5.x before 2.5.4, 2.6.x before 2.6.3, 2.3.8, and 2.4.9 allows remote attackers to read arbitrary files and send HTTP requests to intranet servers via a request to (1) /services/2 or (2) services/latest with a DTD containing an XML external entity declaration in conjunction with an entity reference.
References
Link | Resource |
---|---|
http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf | Exploit URL Repurposed |
https://jira.atlassian.com/browse/CWD-3366 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf - Exploit, URL Repurposed |
Information
Published : 2013-07-01 21:55
Updated : 2024-02-14 01:17
NVD link : CVE-2013-3925
Mitre link : CVE-2013-3925
CVE.ORG link : CVE-2013-3925
JSON object : View
Products Affected
atlassian
- crowd
CWE
CWE-20
Improper Input Validation