An authentication bypass vulnerability has been discovered in Atlassian Jira and Jira Service Management products. The vulnerability is being tracked as CVE-2022-0540.
Atlassian has released a public security advisory addressing the critical authentication bypass vulnerability in Seraph, the company’s web application security framework. Note that this vulnerability does not impact the cloud versions of Jira and Jira Service Management.
Jira is a proprietary issue tracking product developed by Atlassian. This tool is now extensively used by agile development teams to monitor bugs, stories, epics, and other activities. Seraph is a pluggable core element system that is used in Jira and Confluence to handle all login and logout requests.
In an authentication bypass vulnerability, an attacker gains access to an application, service, or device with the rights of an authorized or privileged user by avoiding or manipulating an authentication method.
The vulnerability (CVE-2022-0540) allows a remote attacker to bypass authentication by submitting a specially crafted HTTP request utilizing an affected configuration.
Although the flaw is in Jira’s core, it affects first and third-party apps that declare
roles-required at the
webwork1 action namespace level rather than at the
action level. For a given operation to be affected, it must not perform any further authentication or authorization checks.
- Jira Core Server
- Jira Software Server
- Jira Software Data Center
- Jira Service Management
- Jira Service Management Server
- Jira Service Management Data Center
- version < 8.13.18
- 8.14.0 ≤ version < 8.20.6
- 8.21.0 ≤ version < 8.22.0
Jira has released the following versions addressing the vulnerability:
- 8.13.x >= 8.13.18
- 8.20.x >= 8.20.6
- All versions >= 8.22.0
The latest versions can be downloaded from Jira Core or Jira Software. For more information, please refer to Jira Security Advisory.
Qualys customers can scan their devices with QID 730451 to detect vulnerable assets.
Please continue to follow Qualys Threat Protection for more coverage on the latest vulnerabilities.