A major security flaw has been discovered in Atlassian's Jira Service Management Server and Data Center, which could allow an unauthorized user to pretend to be someone else and gain remote access to the system. The vulnerability, tracked as CVE-2023-22501, has a critical severity score of 9.4 and affects versions 5.3.0 to 5.5.0. It is particularly dangerous for bot accounts, as they are more likely to be included in Jira issues or requests or receive emails with a View Request link, which is necessary for acquiring signup tokens. Atlassian has released updates to fix the issue and recommends admins upgrade to versions 5.3.3, 5.4.2, 5.5.1, and 5.6.0 or later. They have also provided a workaround in the form of a JAR file. After applying the update or the JAR file, admins should check which accounts have changed their passwords and logged in since the previous version, as this could indicate unauthorized access. If a breach is detected, the server should be shut down and disconnected from the network to limit the damage.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Fri, 03 Feb 2023 14:33:02 +0000