Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_113249
HistoryJun 28, 2022 - 12:00 a.m.

Atlassian Jira Seraph Authentication Bypass

2022-06-2800:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
20

Atlassian Jira versions < 8.13.18, 8.14.x, 8.15.x, 8.16.x, 8.17.x, 8.18.x, 8.19.x, 8.20.x < 8.20.6, 8.21.x and Atlassian Jira Service Management versions < 4.13.18, 4.14.x, 4.15.x, 4.16.x, 4.17.x, 4.18.x, 4.19.x, 4.20.x < 4.20.6 and 4.21.x use a common authentication framework named Atlassian Jira Seraph which suffers from an authentication bypass vulnerability.

By crafting a specific HTTP request, a remote and unauthenticated attacker could exploit this vulnerability to bypass authentication and authorization requirements in WebWork actions using an affected configuration. The impact of the vulnerability depends on the applications used in the Jira or Jira Service Management instance and their usage of the Jira Seraph framework.

No source data
VendorProductVersionCPE
atlassianjira_core*cpe:2.3:a:atlassian:jira_core:*:*:*:*:*:*:*:*