{ "CVE_data_meta" : { "ASSIGNER" : "security@atlassian.com", "DATE_PUBLIC" : "2018-01-30T00:00:00", "ID" : "CVE-2017-16858", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Crowd", "version" : { "version_data" : [ { "version_value" : "from 1.5.0 before 3.1.2" } ] } } ] }, "vendor_name" : "Atlassian" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The 'crowd-application' plugin module (notably used by the Google Apps plugin) in Atlassian Crowd from version 1.5.0 before version 3.1.2 allowed an attacker to impersonate a Crowd user in REST requests by being able to authenticate to a directory bound to an application using the feature. Given the following situation: the Crowd application is bound to directory 1 and has a user called admin and the Google Apps application is bound to directory 2, which also has a user called admin, it was possible to authenticate REST requests using the credentials of the user coming from directory 2 and impersonate the user from directory 1." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "Incorrect Authorization (CWE-863)" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://jira.atlassian.com/browse/CWD-5009", "refsource" : "CONFIRM", "url" : "https://jira.atlassian.com/browse/CWD-5009" } ] } }