Atlassian Crucible 2.5.8 / 2.6.8 / 2.7.12 XML Parsing Vulnerability

high Nessus Plugin ID 59327


The version of Atlassian Crucible installed on the remote host may be affected by an XML parsing vulnerability.


According to its self-reported version, the version of Atlassian Crucible running on the remote host is potentially affected by an XML parsing vulnerability. This vulnerability may allow an unauthenticated, remote attacker to perform a denial of service attack against Crucible. This vulnerability may also allow an unauthenticated, remote attacker to read any local files that the Crucible user can access.


Upgrade to Crucible 2.5.8 / 2.6.8 / 2.7.12 or later.

See Also

Plugin Details

Severity: High

ID: 59327

File Name: crucible_2_7_12.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 6/1/2012

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

CPE: cpe:/a:atlassian:crucible

Required KB Items: Settings/ParanoidReport, installed_sw/crucible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/17/2012

Vulnerability Publication Date: 3/26/2012

Reference Information

BID: 53603