{"id":16891,"date":"2023-02-03T18:32:02","date_gmt":"2023-02-03T17:32:02","guid":{"rendered":"https:\/\/www.show.it\/atlassian-warns-of-critical-jira-service-management-vulnerability\/"},"modified":"2023-02-03T18:32:02","modified_gmt":"2023-02-03T17:32:02","slug":"atlassian-warns-of-critical-jira-service-management-vulnerability","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/atlassian-warns-of-critical-jira-service-management-vulnerability\/","title":{"rendered":"Atlassian Warns of Critical Jira Service Management Vulnerability"},"content":{"rendered":"<p><strong>Atlassian this week warned of a critical-severity authentication vulnerability in Jira Service Management Server and Data Center that could allow attackers to impersonate Jira users.<\/strong><\/p>\n<p>Tracked as CVE-2023-22501 (CVSS score of 9.4), the flaw impacts Jira Service Management Server and Data Center versions 5.3.0, 5.3.1, 5.3.2, 5.4.0, 5.4.1, and 5.5.0.<\/p>\n<p>\u201cAn authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances,\u201d Atlassian notes in<a href=\"https:\/\/confluence.atlassian.com\/jira\/jira-service-management-server-and-data-center-advisory-cve-2023-22501-1188786458.html\" target=\"_blank\" rel=\"noreferrer noopener\"> its advisory<\/a>.<\/p>\n<p>\u201cWith write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into,\u201d the company continues.<\/p>\n<p>The attacker can obtain access to these tokens if they are included in Jira issues or requests with these users, or if the attacker obtains emails containing \u2018View Request\u2019 links from these users.<\/p>\n<p>According to Atlassian, bot accounts are most likely to be targeted in such attacks. However, external customer accounts on instances with single sign-on may also be affected if account creation is open to anyone.<\/p>\n<p>The vulnerability does not impact Jira sites that are hosted by Atlassian, and which are accessed via an atlassian.net domain.<\/p>\n<p>Patches for this vulnerability were included in Jira Service Management Server and Data Center versions 5.3.3, 5.4.2, 5.5.1, and 5.6.0.<\/p>\n<p>Users are advised to update their Jira installations as soon as possible.<\/p>\n<p><strong>Related:<\/strong><a href=\"https:\/\/www.securityweek.com\/jira-align-vulnerabilities-exposed-atlassian-infrastructure-attacks\/\"> Jira Align Vulnerabilities Exposed Atlassian Infrastructure to Attacks<\/a><\/p>\n<p><strong>Related:<\/strong><a href=\"https:\/\/www.securityweek.com\/atlassian-patches-critical-authentication-bypass-vulnerability-jira\/\"> Atlassian Patches Critical Authentication Bypass Vulnerability in Jira<\/a><\/p>\n<p><strong>Related:<\/strong><a href=\"https:\/\/www.securityweek.com\/atlassian-patches-critical-vulnerability-jira-data-center-products\/\"> Atlassian Patches Critical Vulnerability in Jira Data Center Products<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.securityweek.com\/atlassian-warns-of-critical-jira-service-management-vulnerability\/\">Atlassian Warns of Critical Jira Service Management Vulnerability<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.securityweek.com\/\">SecurityWeek<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atlassian this week warned of a critical-severity authentication vulnerability in Jira Service Management Server and Data Center that could allow attackers to impersonate Jira users. Tracked as CVE-2023-22501 (CVSS score of 9.4), the flaw impacts Jira Service Management Server and Data Center versions 5.3.0, 5.3.1, 5.3.2, 5.4.0, 5.4.1, and 5.5.0. \u201cAn authentication vulnerability was discovered [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[183,23],"tags":[],"class_list":["post-16891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-jira","category-vulnerabilities"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/16891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=16891"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/16891\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/16892"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=16891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=16891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=16891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}