ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Atlassian Crowd Exploit - CVE-2019-11580

Risk Factors

An unauthenticated attacker can leverage publicly-available code to exploit this vulnerability. A successful exploit can result in the attacker gaining control of the server and launching attacks on other network devices.

Category

Exploitation
Detection diagram
Next in Exploitation: Certsync Activity

Attack Background

Atlassian Crowd and Crowd Data Center are centralized identity management applications for enterprises. These applications include a pdkinstall development plugin that is incorrectly enabled. An attacker can exploit this plugin by sending an HTTP POST request (with a URI that ends with /admin/uploadplugin.action) to the application. The HTTP request includes a combination of one or more Java Archive (JAR) files for installing a malicious plugin. After the application receives the request, the application installs the plugin from the JAR files and runs malicious code on the server.

Mitigation Options

Upgrade to a fixed version

If unable to upgrade, delete any pdkinstall-plugin JAR files from the Crowd installation directory and the data directory and remove the pdkinstall-plugin JAR file from <Crowd installation directory>/crowd-webapp/WEB-INF/classes/atlassian-bundled-plugins.zip

MITRE ATT&CK ID

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization&#x27;s lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?