CVE-2021-26073 - Broken authentication in Atlassian Connect Express (ACE)

説明

Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions between 3.0.2 - 6.5.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. This is fixed in version 6.6.0.

影響バージョン

  • 3.0.2 〜 6.5.0

修正対象バージョン

  • 6.6.0 以降

深刻度

This is an independent assessment and you should evaluate its applicability to your own IT environment.

CVSS v3 score: 9.1 => Critical severity

Exploitability Metrics

攻撃ベクトルネットワーク
攻撃の複雑さ
必要な権限
ユーザー相互作用なし


Scope Metric

範囲Changed


Impact Metrics

機密性
整合性
可用性

https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L


必要なアクション
 

Atlassian recommends that you upgrade to the latest version. Upgrade to atlassian-connect-express to 6.6.0 or higher.


最終更新日 2021 年 5 月 6 日

この内容はお役に立ちましたか?

はい
いいえ
この記事についてのフィードバックを送信する
Powered by Confluence and Scroll Viewport.