Saml Single Sign On Atlassian Saml Single Sign On

Do you want an email whenever new security vulnerabilities are reported in Atlassian Saml Single Sign On?

By the Year

In 2024 there have been 0 vulnerabilities in Atlassian Saml Single Sign On . Saml Single Sign On did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 9.80
2020 0 0.00
2019 1 7.50
2018 0 0.00

It may take a day or so for new Saml Single Sign On vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Atlassian Saml Single Sign On Security Vulnerabilities

The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e

CVE-2021-37843 9.8 - Critical - August 02, 2021

The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9.

Missing Authentication for Critical Function

An issue was discovered in the SAML Single Sign On (SSO) plugin for several Atlassian products affecting versions 3.1.0 through 3.2.2 for Jira and Confluence

CVE-2019-13347 7.5 - High - December 13, 2019

An issue was discovered in the SAML Single Sign On (SSO) plugin for several Atlassian products affecting versions 3.1.0 through 3.2.2 for Jira and Confluence, versions 2.4.0 through 3.0.3 for Bitbucket, and versions 2.4.0 through 2.5.2 for Bamboo. It allows locally disabled users to reactivate their accounts just by browsing the affected Jira/Confluence/Bitbucket/Bamboo instance, even when the applicable configuration option of the plugin has been disabled ("Reactivate inactive users"). Exploiting this vulnerability requires an attacker to be authorized by the identity provider and requires that the plugin's configuration option "User Update Method" have the "Update from SAML Attributes" value.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Atlassian Saml Single Sign On or by Atlassian? Click the Watch button to subscribe.

Atlassian
Vendor

subscribe