Various rest resources in Fisheye and Crucible before version 4.8.9 allowed remote attackers to brute force user login credentials as rest resources did not check if users were beyond their max failed login limits and therefore required solving a CAPTCHA in addition to providing user credentials for authentication via a improper restriction of excess authentication attempts vulnerability.
References
Link Resource
https://jira.atlassian.com/browse/CRUC-8523 Issue Tracking Vendor Advisory
https://jira.atlassian.com/browse/FE-7387 Issue Tracking Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: atlassian

Published: 2022-03-14T00:00:00

Updated: 2022-03-16T00:55:19

Reserved: 2021-11-16T00:00:00


Link: CVE-2021-43958

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-03-16T01:15:07.950

Modified: 2022-03-22T16:02:29.927


Link: CVE-2021-43958

JSON object: View

cve-icon Redhat Information

No data.

CWE