Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attackers to authenticate using an expired user session via an insufficient session expiration vulnerability.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Crowd | Atlassian | * | 3.2.7 (excluding) |
Crowd | Atlassian | 3.3.0 (including) | 3.3.4 (excluding) |
Such a scenario is commonly observed when: