CVE-2016-6496
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
09/12/2016
Last modified:
12/04/2025
Description
The LDAP directory connector in Atlassian Crowd before 2.8.8 and 2.9.x before 2.9.5 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:* | 2.8.4 (including) | |
cpe:2.3:a:atlassian:crowd:2.9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:atlassian:crowd:2.9.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/archive/1/539655/100/0/threaded
- http://www.securityfocus.com/bid/93826
- https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html
- https://jira.atlassian.com/browse/CWD-4790
- https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf
- http://www.securityfocus.com/archive/1/539655/100/0/threaded
- http://www.securityfocus.com/bid/93826
- https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html
- https://jira.atlassian.com/browse/CWD-4790
- https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf