This question is in reference to Atlassian Documentation: Crowd Security Advisory 2016-10-19
According to my understanding, your installation has then a quite low risk of a security breach. Only a admin are able to breach your installation by setting up some type of "invalid" LDAP that use the exploit.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.