Atlassian this week warned of a critical-severity authentication vulnerability in Jira Service Management Server and Data Center that could allow attackers to impersonate Jira users.
Tracked as CVE-2023-22501 (CVSS score of 9.4), the flaw impacts Jira Service Management Server and Data Center versions 5.3.0, 5.3.1, 5.3.2, 5.4.0, 5.4.1, and 5.5.0.
“An authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances,” Atlassian notes in its advisory.
“With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into,” the company continues.
The attacker can obtain access to these tokens if they are included in Jira issues or requests with these users, or if the attacker obtains emails containing ‘View Request’ links from these users.
According to Atlassian, bot accounts are most likely to be targeted in such attacks. However, external customer accounts on instances with single sign-on may also be affected if account creation is open to anyone.
The vulnerability does not impact Jira sites that are hosted by Atlassian, and which are accessed via an atlassian.net domain.
Patches for this vulnerability were included in Jira Service Management Server and Data Center versions 5.3.3, 5.4.2, 5.5.1, and 5.6.0.
Users are advised to update their Jira installations as soon as possible.
Related: Jira Align Vulnerabilities Exposed Atlassian Infrastructure to Attacks
Related: Atlassian Patches Critical Authentication Bypass Vulnerability in Jira
Related: Atlassian Patches Critical Vulnerability in Jira Data Center Products