[![Atlassian Hacking](https://thehackernews.com/images/-bf-nviQ7QOQ/YNRYyYeddxI/AAAAAAAAC-k/OjSyvfk4SV81J_vouujuRiwnUcsZCBTyQCLcBGAsYHQ/s728-e1000/Atlassian-hacking.jpg)](<https://thehackernews.com/images/-bf-nviQ7QOQ/YNRYyYeddxI/AAAAAAAAC-k/OjSyvfk4SV81J_vouujuRiwnUcsZCBTyQCLcBGAsYHQ/s0/Atlassian-hacking.jpg>) Cybersecurity researchers on Wednesday disclosed critical flaws in the Atlassian project and software development platform that could be exploited to take over an account and control some of the apps connected through its single sign-on ([SSO](<https://en.wikipedia.org/wiki/Single_sign-on>)) capability. "With just one click, an attacker could have used the flaws to get access to Atlassian's publish Jira system and get sensitive information, such as security issues on Atlassian cloud, Bitbucket and on premise products," Check Point Research [said](<https://research.checkpoint.com/2021/a-supply-chain-breach-taking-over-an-atlassian-account/>) in an analysis shared with The Hacker News. After the issues were reported to Atlassian on Jan. 8, 2021, the Australian company deployed a fix as part of its [updates](<https://confluence.atlassian.com/jirasoftware/jira-software-release-notes-776821069.html>) rolled out on [May 18](<https://confluence.atlassian.com/jirasoftware/jira-software-8-17-x-release-notes-1063559166.html>). The sub-domains affected by the flaws include - * jira.atlassian.com * confluence.atlassian.com * getsupport.atlassian.com * partners.atlassian.com * developer.atlassian.com * support.atlassian.com * training.atlassian.com Successful exploitation of these flaws could result in a supply-chain attack wherein an adversary can take over an account, using it to perform unauthorized actions on behalf of the victim, edit Confluence pages, access Jira tickets, and even inject malicious implants to stage further attacks down the line. [![Atlassian Hacking](https://thehackernews.com/images/-g7U6m8t1318/YNRWxFewI0I/AAAAAAAAC-c/vq5YhLgZ5TswFc2Mk6dDopm0b4UTiN02QCLcBGAsYHQ/s728-e1000/Atlassian-hacking.jpg)](<https://thehackernews.com/images/-g7U6m8t1318/YNRWxFewI0I/AAAAAAAAC-c/vq5YhLgZ5TswFc2Mk6dDopm0b4UTiN02QCLcBGAsYHQ/s0/Atlassian-hacking.jpg>) The weaknesses hinge on the fact that Atlassian uses SSO to ensure seamless navigation between the aforementioned domains, thus creating a potential attack scenario that involves injecting malicious code into the platform using [XSS](<https://www.imperva.com/learn/application-security/cross-site-scripting-xss-attacks/>) and [CSRF](<https://www.imperva.com/learn/application-security/csrf-cross-site-request-forgery/>), followed by leveraging a [session fixation](<https://owasp.org/www-community/attacks/Session_fixation>) flaw to hijack a valid user session and take control of an account. In other words, an attacker can trick a user into clicking on a specially-crafted Atlassian link in order to execute a malicious payload that steals the user's session, which can then be used by the bad actor to log in to the victim's account and obtain sensitive information. What's more, armed with the Jira account, the attacker can proceed to gain control of a Bitbucket account by opening a Jira ticket embedded with a malicious link to a rogue website that, when clicked from an [auto-generated email message](<https://confluence.atlassian.com/adminjiraserver/configuring-email-notifications-938847633.html>), could be used to pilfer the credentials, effectively granting them permissions to access or alter source code, make a repository public, or even insert backdoors. "Supply chain attacks have piqued our interest all year, ever since the [SolarWinds incident](<https://thehackernews.com/2021/04/researchers-find-additional.html>). The platforms from Atlassian are central to an organization's workflow," said [Oded Vanunu](<https://twitter.com/od3dv>), head of products vulnerabilities research at Check Point. "An incredible amount of supply chain information flows through these applications, as well as engineering and project management." "In a world where distributed workforces increasingly depend on remote technologies, it's imperative to ensure these technologies have the best defenses against malicious data extraction," Vanunu added. Found this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter __](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.