Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Atlassian Patches Critical Vulnerability in Jira Data Center Products

Software development and collaboration solutions provider Atlassian on Wednesday informed customers that it has patched a critical code execution vulnerability affecting some of its Jira products.

Software development and collaboration solutions provider Atlassian on Wednesday informed customers that it has patched a critical code execution vulnerability affecting some of its Jira products.

According to Atlassian, security researcher Harrison Neal discovered that Jira Data Center — including Software Data Center and Core Data Center — and Jira Service Management Data Center software development products are affected by a critical flaw related to missing authentication for the Ehcache RMI network service.

An attacker who can connect to this service on port 40001 or 40011 can execute arbitrary code in Jira through deserialization.

“While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service,” Atlassian said in a security advisory.

The company pointed out that non-Data Center instances of Jira Server and Jira Service Management are not impacted, and neither are Jira Cloud and Jira Service Management Cloud customers.

Jira Data Center users have been advised to update their installations to versions 8.5.16, 8.13.8 or 8.17.0. Jira Service Management Data Center users can patch the vulnerability by ensuring that they are running versions 4.5.16, 4.13.8 or 4.17.0.

Advertisement. Scroll to continue reading.

As for mitigations, Atlassian recommends restricting access to the Ehcache RMI ports to only cluster instances, using firewalls or other types of security products.

Both profit-driven cybercriminals and state-sponsored threat actors have been known to target vulnerabilities in Atlassian products so it’s important that organizations don’t ignore these security holes.

Last month, cybersecurity firm Check Point disclosed several vulnerabilities that could have been chained to take over Atlassian accounts or access a company’s Bitbucket-hosted source code.

Related: Critical Vulnerability Addressed in Jira Service Desk

Related: JIRA Misconfiguration Leaks Data of Fortune 500 Companies

Related: AESDDoS Botnet Targets Vulnerability in Atlassian’s Confluence Server

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.