CVE-2018-20238
Summary
| CVE | CVE-2018-20238 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-02-13 18:29:00 UTC |
| Updated | 2019-02-26 15:42:00 UTC |
| Description | Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability. |
Risk And Classification
Problem Types: CWE-384
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [CWD-5361] Insufficient Session Expiration of user sessions - CVE-2018-20238 - Create and track feature requests for Atlassian products. | CONFIRM | jira.atlassian.com | Vendor Advisory |
| Atlassian Crowd CVE-2018-20238 Authentication Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.