» » Jira Align Vulnerabilities Exposed Atlassian Infrastructure to Attacks

Jira Align Vulnerabilities Exposed Atlassian Infrastructure to Attacks

Jira Align Vulnerabilities Exposed Atlassian Infrastructure to Attacks

Residence › Cloud Safety

Jira Align Vulnerabilities Uncovered Atlassian Infrastructure to Assaults

By Ionut Arghire on October 25, 2022

Tweet

Vulnerabilities addressed lately in Jira Align may permit an attacker to raise privileges, receive Atlassian cloud credentials, and probably go after Atlassian infrastructure, researchers with Bishop Fox warn.

Enterprise software-as-a-service (SaaS) for the planning of improvement lifecycles, Jira Align helps software program firms join groups to the enterprise, in contrast to Jira, which connects groups to one another.

Bishop Fox researchers have recognized two high-severity safety defects in Jira Align and warn that an assault exploiting each may have a crucial affect not solely on Jira Align, however on Atlassian infrastructure as nicely.

The primary of the bugs is described as a server-side request forgery (SSRF) flaw within the utility’s ‘Connectors’ settings. An attacker may exploit this vulnerability to “retrieve the AWS credentials of the Atlassian service account that provisioned the Jira Align occasion,” Bishop Fox explains.

The second problem is described as inadequate authorization controls within the ‘Individuals’ permission, permitting any consumer that has this permission to switch their function and change into Tremendous Admin, the very best function in Jira Align.

Having Tremendous Admin privileges, a malicious attacker may entry all knowledge in Jira Align, change consumer or account settings, and alter the safety management for the applying.

Bishop Fox instructed SecurityWeek that an attacker with low-level consumer entry may exploit the second vulnerability to change into Tremendous Admin after which leverage the SSRF to acquire Atlassian cloud credentials.

“If the Atlassian AWS atmosphere was not correctly locked down, that attacker would have been in a position to go after Atlassian infrastructure as a result of the truth that the credentials are usually not particular to the consumer, however for the Atlassian SaaS,” Bishop Fox mentioned.

On this worst-case situation, the attacker’s actions may signify a danger for a number of Atlassian shoppers which are related to the infrastructure.

Tracked as CVE-2022-36802 and CVE-2022-36803, each vulnerabilities could possibly be exploited remotely. The bugs had been addressed in July with the discharge of Jira Align 10.109.3.

Associated: Crucial Flaws in Abode Residence Safety Package Enable Hackers to Hijack, Disable Cameras

Associated: Oracle Releases 370 New Safety Patches With October 2022 CPU

Associated: Cisco Patches Excessive-Severity Vulnerability in Safety Options

Get the Day by day Briefing

 
 
 

  • Most Current
  • Most Learn
  • Jira Align Vulnerabilities Uncovered Atlassian Infrastructure to Assaults
  • Perygee Scores Seed Funding to Deal with IoT Safety
  • Apple Fixes Exploited Zero-Day With iOS 16.1 Patch
  • CNC Machines Susceptible to Hijacking, Knowledge Theft, Damaging Cyberattacks
  • Australia Flags New Company Penalties for Privateness Breaches
  • In Israel, Albanian PM to Meet Cyber Chief After Iran Hack
  • Cyberattack Causes Disruptions at Wholesale Large Metro
  • Crucial Flaws in Abode Residence Safety Package Enable Hackers to Hijack, Disable Cameras
  • Adobe Illustrator Vulnerabilities Rated Crucial, However Exploitation Not Simple
  • Community Safety Firm Corsa Safety Raises $10 Million

Searching for Malware in All of the Mistaken Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Easy methods to Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

Easy methods to Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles