what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Crowd LDAP Java Object Injection

Crowd LDAP Java Object Injection
Posted Oct 31, 2016
Authored by David Black

This advisory discloses a critical severity security vulnerability which was introduced in version 1.4.1 of Crowd. Versions of Crowd starting with 1.4.1 before 2.8.8 (the fixed version for 2.8.x) and from 2.9.0 before 2.9.5 (the fixed version for 2.9.x) are affected by this vulnerability. The Crowd LDAP directory connector allowed an attacker to gain remote code execution in Crowd by injecting malicious attributes in LDAP entries.

tags | advisory, remote, code execution
advisories | CVE-2016-6496
SHA-256 | 00e91976667b938daa14e3aa6743fb0498e57d84e1eb456c7cb1f29f942fcf81

Crowd LDAP Java Object Injection

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Note: the current version of this advisory can be found at
https://confluence.atlassian.com/x/wykQMw .

CVE ID:
* CVE-2016-6496 - Crowd LDAP Java Object Injection

Product: Crowd

Affected Crowd Versions:
1.4.1 <= version < 2.8.8
2.9.0 <= version < 2.9.5

Fixed Crowd versions:
* for 2.8.x, Crowd 2.8.8 has been released with a fix for this issue.
* for 2.9.x, Crowd 2.9.5 has been released with a fix for this issue.
* for 2.10.x, Crowd 2.10.1 has been released with a fix for this issue.

Summary:
This advisory discloses a critical severity security vulnerability
which was introduced in version 1.4.1 of Crowd. Versions of Crowd
starting with 1.4.1 before 2.8.8 (the fixed version for 2.8.x) and
from 2.9.0 before 2.9.5 (the fixed version for 2.9.x) are affected by
this vulnerability.

Atlassian Cloud customers are not affected by the issue described in
this advisory.

Customers who have downloaded and installed Crowd >= 1.4.1 less than
2.8.8 (the fixed version for 2.8.x) or Customers who have downloaded
and installed Crowd >= 2.9.0 less than 2.9.5 (the fixed version for
2.9.x) please upgrade your Crowd installations immediately to fix this
vulnerability.

JIRA Core, JIRA Software, JIRA Service Desk, Confluence, Bitbucket
Server, FishEye and Crucible installations which do not use SSL/TLS
connection to configured LDAP server or allow users to manipulate
specific attributes of an LDAP entry are affected by this issue.
Atlassian rates the severity level of this vulnerability in these
products as high. According to Security Bug fix Policy fixes are
included in the last maintenance releases.

Customers who have downloaded and installed JIRA >= 4.3.0 less than
7.2.1 (the fixed version for 7.2.x) or who have downloaded and
installed Confluence >= 3.5.0 less than 5.10.6 (the fixed version for
5.10.x) or who have downloaded and installed Bitbucket Server >= 1.3.0
less than 4.10.0 (the fixed version for 4.10.x) or who have downloaded
and installed FishEye and Crucible >= 4.0.0 less than 4.2.0 (the fixed
version for 4.2.x) we recommend to upgrade your installations to fix
this vulnerability.


Crowd LDAP Java Object Injection (CVE-2016-6496)

Severity:
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or
low. This is an independent assessment and you should evaluate its
applicability to your own IT environment.

Description:

The Crowd LDAP directory connector allowed an attacker to gain remote
code execution in Crowd by injecting malicious attributes in LDAP
entries. To exploit this issue, attackers either need to modify an
entry in an LDAP directory that Crowd is configured to use or
successfully execute a Man-in-The-Middle attack between an LDAP server
and Crowd. Crowd installations configured to communicate with an LDAP
server using the LDAPS protocol with the Secure SSL option enabled are
immune to the Man-in-The-Middle attack vector only (unless an attacker
is able to obtain the private key of the SSL/TLS certificate used to
secure the communication).

All versions of Crowd from 1.4.1 before 2.8.8 (the fixed version for
2.8.x) and from 2.9.0 before 2.9.5 (the fixed version for 2.9.x) are
affected by this vulnerability. This issue can be tracked here:
https://jira.atlassian.com/browse/CWD-4790 .

Acknowledgements:
We would like to credit Alvaro Munoz and Alexander Mirosh of HPE
Security Fortify for reporting this issue to us.

Fix:

We have taken the following steps to address this issue:
* Crowd version 2.10.1 has been released with a fix for this issue.
* Crowd version 2.9.5 has been released with a fix for this issue.
* Crowd version 2.8.8 has been released with a fix for this issue.
* JIRA Core version 7.2.1 has been released with a fix for this issue.
* Confluence version 5.10.6 has been released with a fix for this issue.
* Bitbucket Server version 4.10.0 has been released with a fix for this issue.
* FishEye and Crucible version 4.2.0 has been released with a fix for
this issue.

Remediation:

Upgrade Crowd to version 2.10.1 or higher.
If you are running Crowd 2.9.x and cannot upgrade to Crowd 2.10.1 then
upgrade to version 2.9.5.
If you are running Crowd 2.8.x and cannot upgrade to Crowd 2.9.5 then
upgrade to version 2.8.8.

For a full description of the latest version of Crowd, see the release
notes found at https://confluence.atlassian.com/crowd/crowd-release-notes-199094.html.
You can download the latest version of Crowd from the download centre
found at https://www.atlassian.com/software/crowd/download .

Upgrade JIRA Core (this is also required if you are running JIRA
Software or JIRA Service Desk) to version 7.2.1 or higher.

For a full description of the latest version of JIRA, see the release
notes found at https://confluence.atlassian.com/display/AdminJIRA/JIRA+7.2.x+platform+release+notes
. You can download the latest version of JIRA from the download centre
found at https://www.atlassian.com/software/jira/download .

Upgrade Confluence to version 5.10.6 or higher.

For a full description of the latest version of Confluence, see the
release notes found at
https://confluence.atlassian.com/display/DOC/Confluence+Release+Notes.
You can download the latest version of Confluence from the download
centre found at https://www.atlassian.com/software/confluence/download
.

Upgrade Bitbucket Server to version 4.10.0 or higher.

For a full description of the latest version of Bitbucket Server, see
the release notes found at
https://confluence.atlassian.com/display/BitbucketServer/Releases .
You can download the latest version of Bitbucket Server from the
download centre found at
https://www.atlassian.com/software/bitbucket/download .

Upgrade FishEye and Crucible to version 4.2.0 or higher.

For a full description of the latest version of FishEye and Crucible,
see the release notes found at
https://confluence.atlassian.com/fisheye/fisheye-releases-298976966.html
. You can download the latest version of FishEye and Crucible from the
download centre found at
https://www.atlassian.com/software/fisheye/download .


Support:
If you have questions or concerns regarding this advisory, please
raise a support request at https://support.atlassian.com/.

- --
David Black / Security Engineer.
-----BEGIN PGP SIGNATURE-----
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=6M/t
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close