Atlassian Crowd Unauthorized Access Vulnerability

CVE-2019-11580

Vulnerability Overview

Atlassian Crowd Data Center is the clustered deployment version of Crowd. Atlassian Crowd and Crowd Data Center had a security vulnerability due to a plugin development pdkinstall being mistakenly enabled in certain releases, allowing attackers to install any malicious plugins and execute arbitrary code/commands without authorization, thereby gaining server privileges.

Affected Versions

  • 2.1.0 <= version < 3.0.5

  • 3.1.0 <= version < 3.1.6

  • 3.2.0 <= version < 3.2.8

  • 3.3.0 <= version < 3.3.5

  • 3.4.0 <= version < 3.4.4

Environment Setup

Download and set up Atlassian-crowd-3.4.3, configure the vulnerability environment, and download version 3.4.3 of crowd.

wget https://product-downloads.atlassian.com/software/crowd/downloads/atlassian-crowd-3.4.3.zip

Modify the configuration file.

[root@localhost atlassian-crowd-3.4.3]# pwd
/opt/atlassian-crowd-3.4.3
[root@localhost atlassian-crowd-3.4.3]# vim crowd-webapp/WEB-INF/classes/crowd-init.properties

Change the path of the main directory.

image-20220726121537863

Start Crowd.

Access port 8095.

image-20220726121716750

Obtain the server id B1DP-2T7V-FIPR-PEBO and use the cracking program atlassian-agent.jar to get the license information.

image-20220726121749173

Generate the cracking code.

Complete the installation.

image-20220726122116609

Exploitation

Use the exploitation script CVE-2019-11580.py.

Visit the obtained shell address and access IP address without authentication.

image-20230130112327195

Last updated