Broken Authentication in Atlassian Connect Spring Boot by Atlassian
CVE-2021-26077

8.8HIGH

Key Information:

Vendor
Atlassian
Vendor
CVE Published:
10 May 2021

Summary

The vulnerability in Atlassian Connect Spring Boot allows attackers to exploit a flaw in the authentication mechanism. Specifically, versions prior to 2.1.3 and between 2.1.4 and 2.1.5 erroneously accept context JWTs at lifecycle endpoints, where only server-to-server JWTs should be processed. This misconfiguration can enable attackers to execute unauthorized re-installation events within an application, posing significant security risks.

Affected Version(s)

Atlassian Connect Spring Boot (ACSB) 1.1.0

Atlassian Connect Spring Boot (ACSB) < 2.1.3

Atlassian Connect Spring Boot (ACSB) 2.1.4

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.