Atlassian Crucible 2.5.8 / 2.6.8 / 2.7.12 XML Parsing Vulnerability

High Nessus Plugin ID 59327


The version of Atlassian Crucible installed on the remote host may be affected by an XML parsing vulnerability.


According to its self-reported version, the version of Atlassian Crucible running on the remote host is potentially affected by an XML parsing vulnerability. This vulnerability may allow an unauthenticated, remote attacker to perform a denial of service attack against Crucible. This vulnerability may also allow an unauthenticated, remote attacker to read any local files that the Crucible user can access.


Upgrade to Crucible 2.5.8 / 2.6.8 / 2.7.12 or later.

See Also

Plugin Details

Severity: High

ID: 59327

File Name: crucible_2_7_12.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 2012/06/01

Modified: 2018/11/15

Dependencies: 59326

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:crucible

Required KB Items: installed_sw/crucible, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/05/17

Vulnerability Publication Date: 2012/03/26

Reference Information

BID: 53603