Atlassian has published a security advisory warning of a critical vulnerability in its Jira application that could be abused by a remote, unauthenticated attacker to circumvent authentication protections.
Tracked as CVE-2022-0540, the flaw is rated 9.9 out of 10 on the CVSS scoring procedure and resides in Jira’s authentication framework, Jira Seraph. Khoadha of Viettel Cyber Security has been credited with finding and reporting the security weak spot.
“A remote, unauthenticated attacker could exploit this by sending a specifically crafted HTTP request to bypass authentication and authorization specifications in WebWork actions working with an impacted configuration,” Atlassian pointed out.
The flaw has an effect on the adhering to Jira items –
- Jira Main Server, Jira Software package Server and Jira Computer software Info Middle: All variations just before 8.13.18, 8.14.x, 8.15.x, 8.16.x, 8.17.x, 8.18.x, 8.19.x, 8.20.x in advance of 8.20.6, and 8.21.x
- Jira Company Administration Server and Jira Assistance Administration Data Centre: All versions just before 4.13.18, 4.14.x, 4.15.x, 4.16.x, 4.17.x, 4.18.x, 4.19.x, 4.20.x right before 4.20.6, and 4.21.x
Mounted Jira and Jira Service Management versions are 8.13.18, 8.20.6, and 8.22. and 4.13.18, 4.20.6, and 4.22..
Atlassian also noted that the flaw impacts very first and 3rd-get together apps only if they are set up in 1 of the aforementioned Jira or Jira Services Management variations and that they are working with a vulnerable configuration.
Customers are strongly suggested to update to just one of the patched variations to mitigate probable exploitation attempts. If rapid patching is just not an alternative, the business is advising updating the influenced applications to a set variation or disabling them entirely.
It really is worthy of noting that a critical remote code execution flaw in Atlassian Confluence (CVE-2021-26084, CVSS score: 9.8) was actively weaponized in the wild previous calendar year to set up cryptocurrency miners on compromised servers.
Identified this report fascinating? Observe THN on Facebook, Twitter and LinkedIn to browse much more exceptional content we put up.
Some parts of this article are sourced from:
thehackernews.com