Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-73650

Authentication Bypass in Jira Seraph - CVE-2022-0540

    XMLWordPrintable

Details

    • 9.9
    • Critical
    • CVE-2022-0540

    Description

       Updates

      2022/05/05 11:30 AM PDT

      • Updated the List of affected Atlassian Marketplace Apps section to note the following apps have non-vulnerable updates available:
        • Secure Code Warrior® for Jira
        • Simple Tasklists
        • Simple Team Pages for Jira
        • UiPath Test Manager for Jira
        • Xporter - Export issues from Jira

      2022/04/25 11:40 AM PDT

      • Updated the List of affected Atlassian Marketplace Apps section of the advisory to note the following app is no longer supported:
        • Feedback for Jira - Forms for website

      2022/04/22 12:30 PM PDT

      • Updated the List of affected Atlassian Marketplace Apps section of the advisory to note the following apps have non-vulnerable updates available:
        • VCAP - Video Capture for Jira Service Management
        • Who deleted my issues

      2022/04/21 11:50 AM PDT

      • Updated the List of affected Atlassian Marketplace Apps section of the advisory to note the following apps have non-vulnerable updates available:
        • Calendar for Jira
        • Dependent Select List
        • Smart Checklist for Jira. Pro

      Jira Server and Data Center vulnerable to an authentication bypass in its web authentication framework, Jira Seraph.

      Although the vulnerability is in the core of Jira, it affects first and third party apps that specify roles-required at the webwork1 action namespace level and do not specify it at an action level. For a specific action to be affected, the action will also need to not perform any other authentication or authorization checks.

      For more information on potentially affected apps, please refer to the Determining which apps are affected section in Atlassian's security advisory.

      A remote, unauthenticated attacker could exploit this by requesting a specially crafted URL to bypass authentication and authorization requirements in WebWork actions using an affected configuration.

      This vulnerability was discovered by Khoadha of Viettel Cyber Security.

       

      Affected versions:

      • version < 8.13.18
      • 8.14.0 ≤ version < 8.20.6
      • 8.21.0 ≤ version < 8.22.0

      Fixed versions:

      • 8.13.x >= 8.13.18
      • 8.20.x >= 8.20.6
      • All versions >= 8.22.0

      References

      Jira Security Advisory 2022-04-20

      Attachments

        Issue Links

          Activity

            People

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              32 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: