HipChat Server has a version of the Apache Struts2 that is vulnerable to remote network attackers who can potentially execute code on vulnerable versions of HipChat Server to:
- Execute remote code of their choice
- Make http requests to local and internal services
To exploit this issue, attackers need to have network access to a HipChat Server instance.
All versions of HipChat Server before version 2.2.2 are affected by this vulnerability.
We have taken the following steps to address these issues:
- Released a patch for customers.
- Released HipChat Server version 2.2.2 that contains a fix for the issue.
For additional details see the full advisory.