CVE-2019-20104
Atlassian Crowd vulnerability analysis and mitigation

Overview

The vulnerability CVE-2019-20104 affects the OpenID client application in Atlassian Crowd versions before 3.6.2 and from version 3.7.0 before 3.7.1. This security flaw allows remote attackers to perform Denial of Service (DoS) attacks through an XML Entity Expansion vulnerability. The issue was discovered and reported in January 2020, affecting the OpenID client application which is a testing app bundled with the standard Crowd distribution (Atlassian Jira).

Technical details

The vulnerability exists in the OpenID client application, which runs in the same Tomcat container as the Crowd and OpenID Server. The security flaw specifically relates to XML Entity Expansion, which could be exploited to cause denial of service conditions. While the OpenID client application was deployed by default prior to Crowd Version 3.6.2, it's important to note that this is a testing application used as a starting point for developing OpenID-enabled Java applications (Atlassian Jira).

Impact

The primary impact of this vulnerability is the potential for remote attackers to execute Denial of Service attacks against affected systems. The vulnerability affects the OpenID client application, which although bundled with Crowd, is not required for Crowd or OpenID server to function correctly (Atlassian Jira).

Mitigation and workarounds

Atlassian addressed this vulnerability by disabling the OpenID client application by default in Crowd version 3.6.2 and later releases. For users running older versions who cannot immediately update, Atlassian provides a manual procedure to disable the Crowd OpenID client application. The issue was fixed in versions 3.6.2, 3.7.1, and 4.0.0 (Atlassian Jira).

Additional resources


SourceThis report was generated using AI

Related Atlassian Crowd vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-43782CRITICAL9.8
  • Atlassian CrowdAtlassian Crowd
  • cpe:2.3:a:atlassian:crowd
NoYesNov 17, 2022
CVE-2022-26136CRITICAL9.8
  • BambooBamboo
  • cpe:2.3:a:atlassian:jira
NoYesJul 20, 2022
CVE-2023-22521HIGH8.8
  • Atlassian CrowdAtlassian Crowd
  • cpe:2.3:a:atlassian:crowd
NoYesNov 21, 2023
CVE-2022-26137HIGH8.8
  • BambooBamboo
  • cpe:2.3:a:atlassian:fisheye
NoYesJul 20, 2022
CVE-2020-36240MEDIUM5.3
  • Atlassian CrowdAtlassian Crowd
  • cpe:2.3:a:atlassian:crowd
NoYesMar 01, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management