Atlassian has published security advisories for four critical remote code execution vulnerabilities impacting Confluence, Jira, and Bitbucket servers, along with a companion app for macOS. All security issues addressed received a critical-severity score of at least 9.0 out of 10, based on Atlassian's internal assessment.
The company advises companies to evaluate applicability according to their IT environment.
The company marked none of the security issues as being exploited in the wild.
Due to the popularity of Atlassian products and their extensive deployment in corporate environments, system administrators should prioritize applying the available updates.
CVE-2023-22522: Template injection flaw allowing authenticated users, including those with anonymous access, to inject unsafe input into a Confluence page.
The flaw impacts all Confluence Data Center and Server versions after 4.0.0 and up to 8.5.3.
Vulnerable Asset Discovery versions are anything below 3.2.0 for Cloud and 6.2.0 for Data Center and Server.
CVE-2023-22524: Bypass of blocklist and macOS Gatekeeper on the companion app for Confluence Server and Data Center for macOS, impacting all versions of the app prior to 2.0.0.
CVE-2022-1471: RCE in SnakeYAML library impacting multiple versions of Jira, Bitbucket, and Confluence products.
If uninstalling Asset Discovery agents to apply the patch for CVE-2023-22523 is not possible at the moment or has to be delayed, Atlassian provides a temporary mitigation that consists in blocking the port used for communication with agents, which by default is 51337.
In the case of CVE-2023-22522, there is no mitigation solution.
If administrators cannot apply the patch immediately, Atlassian recommends administrators to backup affected instances and take them offline.
If administrators are unable to apply the patch for CVE-2023-22524, the company recommends uninstalling the Atlassian Companion App.
December Android updates fix critical zero-click RCE flaw.
New Microsoft Exchange zero-days allow RCE, data theft attacks.
3,000 Apache ActiveMQ servers vulnerable to RCE attacks exposed online.
HelloKitty ransomware now exploiting Apache ActiveMQ flaw in attacks.
F5 fixes BIG-IP auth bypass allowing remote code execution attacks.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 06 Dec 2023 15:50:19 +0000