Lucene search

K
cve[email protected]CVE-2023-22501
HistoryFeb 01, 2023 - 7:15 p.m.

CVE-2023-22501

2023-02-0119:15:08
CWE-287
web.nvd.nist.gov
79
authentication
vulnerability
jira
service management
server
data center
impersonation
access
attack
user directory
outgoing email
signup tokens
account security
nvd

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.4%

An authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances_._ With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into. Access to these tokens can be obtained in two cases:

  • If the attacker is included on Jira issues or requests with these users, or
  • If the attacker is forwarded or otherwise gains access to emails containing a β€œView Request” link from these users.

Bot accounts are particularly susceptible to this scenario. On instances with single sign-on, external customer accounts can be affected in projects where anyone can create their own account.

Affected configurations

NVD
Node
atlassianjira_service_managementRange5.3.0–5.3.3data_center
OR
atlassianjira_service_managementRange5.3.0–5.3.3server
OR
atlassianjira_service_managementRange5.4.0–5.4.2data_center
OR
atlassianjira_service_managementRange5.4.0–5.4.2server
OR
atlassianjira_service_managementMatch5.5.0data_center
OR
atlassianjira_service_managementMatch5.5.0server

CNA Affected

[
  {
    "vendor": "Atlassian",
    "product": "Jira Service Management Data Center",
    "versions": [
      {
        "version": "before 5.3.0",
        "status": "unaffected"
      },
      {
        "version": "before 5.3.3",
        "status": "affected"
      },
      {
        "version": "before 5.4.2",
        "status": "affected"
      },
      {
        "version": "before 5.5.1",
        "status": "affected"
      },
      {
        "version": "before 5.6.0",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Atlassian",
    "product": "Jira Service Management Server",
    "versions": [
      {
        "version": "before 5.3.0",
        "status": "unaffected"
      },
      {
        "version": "before 5.3.3",
        "status": "affected"
      },
      {
        "version": "before 5.4.2",
        "status": "affected"
      },
      {
        "version": "before 5.5.1",
        "status": "affected"
      },
      {
        "version": "before 5.6.0",
        "status": "affected"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.4%