CVE-2021-26073-Atlassian Connect エクスプレス(ACE)の認証が壊れています
説明
Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions between 3.0.2 - 6.5.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. This is fixed in version 6.6.0.
影響バージョン
3.0.2 - 6.5.0
修正済みバージョン
6.6.0 以降
深刻度
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 9.1 => Critical severity
Exploitability Metrics
攻撃ベクトル | ネットワーク |
---|---|
攻撃の複雑さ | 低 |
必要な権限 | 低 |
ユーザー相互作用 | なし |
Scope Metric
範囲 | Changed |
---|
Impact Metrics
機密性 | 高 |
---|---|
整合性 | 低 |
可用性 | 低 |
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
必要なアクション
Atlassian recommends that you upgrade to the latest version. Upgrade to atlassian-connect-express to 6.6.0 or higher.