Lucene search

K
rapid7blogCaitlin CondonRAPID7BLOG:6DA11479928245BE17785FC3220680D9
HistoryFeb 06, 2023 - 4:46 p.m.

CVE-2023-22501: Critical Broken Authentication Flaw in Jira Service Management Products

2023-02-0616:46:36
Caitlin Condon
blog.rapid7.com
41
cve-2023-22501
atlassian
jira service management
broken authentication
vulnerability
user impersonation
access control
vulnerable versions
mitigation guidance
rapid7
insightvm
nexpose

EPSS

0.002

Percentile

62.3%

CVE-2023-22501: Critical Broken Authentication Flaw in Jira Service Management Products

Emergent threats evolve quickly, and as we learn more about this vulnerability, this blog post will evolve, too.

On February 1, 2023, Atlassian published an advisory for CVE-2023-22501, a critical broken authentication vulnerability affecting its Jira Service Management Server and Data Center offerings. Jira Service Management Server and Jira Service Management Data Center run on top of Jira Core and offer additional features.

According to Atlassian’s advisory, the vulnerability “allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances. With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to sign-up tokens sent to users with accounts that have never been logged into. Access to these tokens can be obtained in two cases:

  • If the attacker is included on Jira issues or requests with these users, or
  • If the attacker is forwarded or otherwise gains access to emails containing a “View Request” link from these users.

Bot accounts are particularly susceptible to this scenario. On instances with single sign-on, external customer accounts can be affected in projects where anyone can create their own account.”

The vulnerability is not known to be exploited in the wild as of February 6, 2023. We are warning customers out of an abundance of caution given Atlassian products’ popularity among attackers the past two years.

Affected Products

The following versions of Jira Service Management Server and Data Center are vulnerable to CVE-2023-22501:

  • 5.3.0
  • 5.3.1
  • 5.3.2
  • 5.4.0
  • 5.4.1
  • 5.5.0

Atlassian Cloud sites (Jira sites accessed via an atlassian.net domain) are notaffected.

Mitigation guidance

Jira Service Management Server and Data Center users should update to a fixed version of the software as soon as possible and monitor Atlassian’s advisory for further information. Atlassian customers who are unable to immediately upgrade Jira Service Management can manually upgrade the version-specific servicedesk-variable-substitution-plugin JAR file as a temporary workaround.

Rapid7 customers

A remote (unauthenticated) check for CVE-2023-22501 was published in the February 6, 2023 InsightVM and Nexpose content release (Content version 1.1.2774).

Updates

  • February 7, 2023 20:30 UTC: Updated Rapid7 customers section

EPSS

0.002

Percentile

62.3%

Related for RAPID7BLOG:6DA11479928245BE17785FC3220680D9