Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Atlassian’s Crowd SSO Software Remains Vulnerable Despite Patches

A technical advisory from Command Five, an Australian security consultancy, has outlined the recently patched flaws in Atlassian’s Crowd Single Sign-on (SSO) software package. However, despite fixes, the turnkey identity management offering still appears to be vulnerable to a major flaw that allows attackers to take complete control of any Crowd server.

A technical advisory from Command Five, an Australian security consultancy, has outlined the recently patched flaws in Atlassian’s Crowd Single Sign-on (SSO) software package. However, despite fixes, the turnkey identity management offering still appears to be vulnerable to a major flaw that allows attackers to take complete control of any Crowd server.

Atlassian’s Crowd is an SSO add-on that can be used with any of their products, which is tied into Active Directory or LDAP, but doubles as an identity management platform that enables organizations to manage permissions, aliases, logins, application access, and more.

According to the company, more than 20,000 major organizations use their products, the most popular being JIRA and Confluence, including several in the Fortune 500. Crowd ties into both of them.

According to Command Five, the companies using Atlassian products would be considered high-value targets due to their operations, and the flaws within the SSO software could have enabled “large scale unauthenticated access to sensitive data and facilitate corruption of the chain-of-trust.”

The Command Five advisory deals with a flaw in Crowd that allowed an attacker to use specially crafted external URLs in the XML’s Document Type Definition (DTD) headers.

By altering the headers, an attacker could make the Crowd server perform GET requests and any data retrieved would be returned to them, or use the file:// parameter in the URL to retrieve any file available to the Crowd server or the target network. This includes, the advisory adds, files available on public shares as well as local files on the machine hosting the Crowd software. Such exploits would bypass the trusted proxy/remote address validation rules that exist within Crowd as a security measure.

In addition, Command Five also discovered that Atlassian products (including the Open ID server that ships with Crowd) store Crowd credentials unencrypted within text files named crowd.properties.

“If a hacker uses the vulnerability to retrieve a file containing credentials, they can then authenticate with the Crowd server directly, or use the exploit again to bypass trusted proxy/remote address validation,” the advisory explains.

Advertisement. Scroll to continue reading.

Prior to publication, Atlassian fixed the Command Five flaws by releasing version 2.6.3 of Crowd. However, that release has an even bigger problem; because the unpatched flaws within could enable an attacker to “take full control of any Crowd server to witch they are able to make a network connection.”

Exploiting this latest flaw would compromise all Crowd credentials (application and user), Crowd accessible data storage, configured directories (LDAP and Active Directory and the data within them), and all secure systems dependent on the vulnerable Crowd server.

Command Five is withholding additional details until Atlassian delivers a second set of fixes.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.