Vulnerability Details : CVE-2013-3925
Atlassian Crowd 2.5.x before 2.5.4, 2.6.x before 2.6.3, 2.3.8, and 2.4.9 allows remote attackers to read arbitrary files and send HTTP requests to intranet servers via a request to (1) /services/2 or (2) services/latest with a DTD containing an XML external entity declaration in conjunction with an entity reference.
Vulnerability category: XML external entity (XXE) injectionInput validation
Products affected by CVE-2013-3925
- cpe:2.3:a:atlassian:crowd:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:crowd:2.4.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-3925
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-3925
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2013-3925
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3925
-
http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf
Exploit
-
https://jira.atlassian.com/browse/CWD-3366
[CWD-3366] Parsing of external XML entities can be exploited to retrieve files or make HTTP requests on the target network - Create and track feature requests for Atlassian products.
Jump to