Atlassian has released updates for Jira and Jira Service Management that addresses a critical authentication bypass vulnerability in its web authentication framework, Jira Seraph. An unauthenticated, remote attacker could exploit this vulnerability by sending a specially crafted HTTP request to bypass authentication and authorisation requirements in WebWork actions using an affected configuration and take control of the system.
Atlassian cloud instances are not vulnerable and no customer action is required.
Installing a fixed version listed below is the surest way to remediate CVE-2022-0540. Once a fixed version has been installed, all apps in your Jira or JSM instance are protected against CVE-2022-0540 and no further action is required.
Jira Core Server
Jira Software Server
Jira Software Data Center
Jira Service Management Server
Jira Service Management Data Center
Jira Security Advisory 2022-04-20 | Atlassian Support | Atlassian Documentation
Further information can also be found here
FAQ for CVE-2022-0540 | Atlassian Support | Atlassian Documentation
Multiple Atlassian products use the third-party software Hazelcast, which is vulnerable to Java deserialization attacks. Hazelcast is used by these products when they’re configured to run as a cluster. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request, resulting in arbitrary code execution.
Bitbucket Server is not affected. Bitbucket Cloud is not affected.
All versions 5.6 and above. Check for the following string in the confluence.cfg.xml file in the Confluence home directory:
<property name="confluence.cluster">true</property>
if this line is present then the software is vulnerable.
There is no fix at present, however the risk is greatly reduced by using a firewall or similar to exclude any device other than the cluster nodes to communicate on 5701/TCP and 5801/TCP. Details in the link below.
If you have any concerns regarding this matter, please contact Daisy via our Service Desk team on 0330 024 3333 or our Customer Portal.