René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

122 lines
4.7 KiB
JSON

{
"id": "CVE-2021-26077",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-05-10T00:15:07.543",
"lastModified": "2021-05-18T17:43:50.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app."
},
{
"lang": "es",
"value": "Autenticaci\u00f3n rota en Atlassian Connect Spring Boot (ACSB) en la versi\u00f3n 1.1.0 antes de la versi\u00f3n 2.1.3 y a partir de la versi\u00f3n 2.1.4 antes de la versi\u00f3n 2.1.5: Atlassian Connect Spring Boot es un paquete Java Spring Boot para crear aplicaciones de Atlassian Connect. La autenticaci\u00f3n entre los productos de Atlassian y la aplicaci\u00f3n Atlassian Connect Spring Boot se produce con un JWT de servidor a servidor o un JWT de contexto. Las versiones de Atlassian Connect Spring Boot 1.1.0 antes de la versi\u00f3n 2.1.3 y las versiones 2.1.4 antes de la versi\u00f3n 2.1.5 aceptan err\u00f3neamente JWTs de contexto en los puntos finales del ciclo de vida (como la instalaci\u00f3n) cuando s\u00f3lo deber\u00edan aceptarse JWTs de servidor a servidor, lo que permite a un atacante enviar eventos de reinstalaci\u00f3n autenticados a una aplicaci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:connect_spring_boot:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"versionEndExcluding": "2.1.3",
"matchCriteriaId": "2AA2CBC2-F9F4-4F3C-8446-D995F1D8AE2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:connect_spring_boot:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.1.4",
"versionEndExcluding": "2.1.5",
"matchCriteriaId": "66CA153C-C748-4587-BFAE-5DD259FAA94B"
}
]
}
]
}
],
"references": [
{
"url": "https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072",
"source": "security@atlassian.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147",
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
]
}
]
}