Fixing a Major Security Issue in Jira Service Management Server and Data Center

This week, a major security vulnerability was fixed in Jira Service Management Server, a popular IT services management platform for enterprises. This vulnerability could have allowed attackers to impersonate users and gain access to access tokens. If the system was configured to allow public sign-up, external customers could have been affected as well. The bug was present in versions 5.3.0 to 5.3.1 and 5.4.0 to 5.5.0 of Jira Service Management Server and Data Center. Atlassian has released fixed versions of the software, as well as a workaround that involves updating a single JAR file in impacted deployments. The vulnerability, tracked as CVE-2023-22501, is classified as a broken authentication issue and is rated as critical severity according to Atlassian's severity scale. If an attacker has write access to a User Directory and outgoing email is enabled on a Jira Service Management instance, they can gain access to signup tokens sent to users with accounts that have never been logged into. These tokens can be obtained if the attacker is included on Jira issues or requests with these users, or if the attacker is forwarded or otherwise gains access to emails containing a View Request link from these users. Bot accounts that were created to work with Jira Service Management are particularly vulnerable to this scenario. Even if the flaw does not affect users synced via read-only User Directories or SSO, users who interact with the instance via email are still affected even when SSO is enabled. Atlassian recommends that companies who do not expose Jira Service Management publicly should still update to a fixed version as soon as possible. If they cannot upgrade the whole system, they should download the fixed servicedesk-variable-substitution-plugin JAR for their particular version, stop Jira, copy the file in the /plugins/installed-plugins directory and then start Jira again. If it is determined that a Jira Service Management Server/DC instance has been compromised, it is advised to immediately shut down and disconnect the server from the network/internet. Additionally, any other systems which potentially share a user base or have common username/password combinations with the compromised system should be shut down. This week, a critical security vulnerability was fixed in Jira Service Management Server, a popular IT services management platform for enterprises. This bug could have allowed attackers to impersonate users and gain access to access tokens, potentially affecting external customers if the system was configured to allow public sign-up. Versions 5.3.0 to 5.3.1 and 5.4.0 to 5.5.0 of Jira Service Management Server and Data Center were affected. Atlassian has released fixed versions of the software, as well as a workaround that involves updating a single JAR file in impacted deployments. The vulnerability, tracked as CVE-2023-22501, is classified as a broken authentication issue and is rated as critical severity according to Atlassian's severity scale. If an attacker has write access to a User Directory and outgoing email is enabled on a Jira Service Management instance, they can gain access to signup tokens sent to users with accounts that have never been logged into. These tokens can be obtained if the attacker is included on Jira issues or requests with these users, or if the attacker is forwarded or otherwise gains access to emails containing a View Request link from these users. Bot accounts that were created to work with Jira Service Management are particularly vulnerable to this scenario. Even if the flaw does not affect users synced via read-only User Directories or SSO, users who interact with the instance via email are still affected even when SSO is enabled. Atlassian recommends that companies who do not expose Jira Service Management publicly should still update to a fixed version as soon as possible. If they cannot upgrade the whole system, they should download the fixed servicedesk-variable-substitution-plugin JAR for their particular version, stop Jira, copy the file in the /plugins/installed-plugins directory and then start Jira again. If it is determined that a Jira Service Management Server/DC instance has been compromised, it is advised to immediately shut down and disconnect the server from the network/internet, as well as any other systems which potentially share a user base or have common username/password combinations with the compromised system. Companies should also search the database for users with the com. Usertokendeletetask.completed property set to TRUE since the vulnerable version has been installed, verify that they have the correct email addresses, and force a password reset for all potentially affected users.

This Cyber News was published on www.csoonline.com. Publication date: Fri, 03 Feb 2023 21:22:02 +0000


Cyber News related to Fixing a Major Security Issue in Jira Service Management Server and Data Center

Fixing a Major Security Issue in Jira Service Management Server and Data Center - This week, a major security vulnerability was fixed in Jira Service Management Server, a popular IT services management platform for enterprises. This vulnerability could have allowed attackers to impersonate users and gain access to access tokens. ...
2 years ago Csoonline.com CVE-2023-22501
CVE-2025-22157 - This High severity PrivEsc (Privilege Escalation) vulnerability was introduced in versions: ...
1 month ago
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
8 months ago Aws.amazon.com
CVE-2020-36239 - Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 ...
2 years ago
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
2 months ago Cybersecuritynews.com
Jira Down: Atlassian users experiencing degraded performance - Atlassian users are experiencing degraded performance amid an 'active incident' affecting multiple Jira products since morning hours today. Similar status updates have been issued for Atlassian offerings like Jira Service Management, Jira ...
2 months ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Atlassian Alerts of Major Security Issue with Jira Service Management - This week, Atlassian warned of a critical-severity authentication vulnerability in Jira Service Management Server and Data Center that could allow malicious actors to impersonate Jira users. If an attacker has write access to a User Directory and ...
2 years ago Securityweek.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
1 month ago Cybersecuritynews.com Inception
Unified Endpoint Management: What is it and What's New? - What began as Mobile Device Management has now transitioned through Mobile Application Management and Enterprise Mobility Management to culminate in UEM. This progression underscores the industry's response to the ever-growing challenges of modern IT ...
1 year ago Securityboulevard.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 year ago Esecurityplanet.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
Building Data Center Infrastructure for the AI Revolution  - This is part two of a multi-part blog series on AI. Part one, Why 2024 is the Year of AI for Networking, discussed Cisco's AI networking vision and strategy. This blog will focus on evolving data center network infrastructure for supporting AI/ML ...
1 year ago Feedpress.me
CVE-2024-21685 - This High severity Information Disclosure vulnerability was introduced in versions 9.4.0, 9.12.0, and 9.15.0 of Jira Core Data Center. ...
1 year ago
Jira Down - Atlassian Jira Outage Disrupts Dashboard Access for Users Globally - Atlassian, the company behind Jira, a leading project management and issue-tracking platform, is grappling with a significant service disruption that has left users unable to load certain Dashboard widgets. According to Atlassian’s incident report, ...
2 months ago Cybersecuritynews.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
2024 brings changes in data security strategies - 2024 will be a revolutionary year for the data security landscape as Data Security Posture Management technology rapidly evolves to keep pace with the colossal amount of data being created, stored and shared within organizations and across business ...
1 year ago Helpnetsecurity.com
15 Best Patch Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive patch management for various operating systems, applications, and third-party software.It is complex for new users and requires time and training to utilize its functionalities fully.Advanced analytics ...
3 months ago Cybersecuritynews.com
How To Build A Data Center Security Strategy For 2025 And Beyond - To build a robust data center security strategy for 2025 and beyond, organizations must adopt a comprehensive, multi-layered approach that addresses both physical and cyber risks, leverages the latest technologies, and incorporates resilient ...
1 month ago Cybersecuritynews.com
McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
1 year ago Americansecuritytoday.com PLATINUM
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
1 year ago Helpnetsecurity.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
1 year ago Esecurityplanet.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
1 year ago Microsoft.com