Learn about CVE-2019-13347, a vulnerability in the SAML Single Sign-On (SSO) plugin used in Atlassian products, allowing unauthorized reactivation of user accounts.
A vulnerability has been identified in the SAML Single Sign-On (SSO) plugin used in multiple Atlassian products, specifically affecting Jira, Confluence, Bitbucket, and Bamboo versions. This vulnerability allows locally disabled users to reactivate their accounts, bypassing the plugin's configuration settings.
Understanding CVE-2019-13347
This CVE pertains to a security flaw in the SAML Single Sign-On (SSO) plugin used in various Atlassian products.
What is CVE-2019-13347?
CVE-2019-13347 is a vulnerability that enables unauthorized users to reactivate their accounts in Jira, Confluence, Bitbucket, and Bamboo instances, even if the plugin's settings prevent such reactivation.
The Impact of CVE-2019-13347
The vulnerability allows attackers with authorization from the identity provider to reactivate disabled accounts, potentially leading to unauthorized access and security breaches.
Technical Details of CVE-2019-13347
This section provides detailed technical information about the CVE.
Vulnerability Description
The vulnerability in the SAML SSO plugin for Atlassian products allows locally disabled users to reactivate their accounts by accessing the affected instances, regardless of the plugin's configuration.
Affected Systems and Versions
Exploitation Mechanism
To exploit this vulnerability, attackers need authorization from the identity provider and the plugin's "User Update Method" configuration set to "Update from SAML Attributes."
Mitigation and Prevention
Protect your systems from CVE-2019-13347 with the following measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates