Impersonation Vulnerability in Jira Service Management by Atlassian
CVE-2023-22501

9.1CRITICAL

Key Information:

Summary

An authentication flaw has been identified in Jira Service Management Server and Data Center which allows an attacker to impersonate legitimate users. Under specific conditions, particularly when write access is provided to a User Directory and outgoing email is active, attackers can exploit vulnerabilities to gain access to signup tokens for accounts that have never logged in. This can occur if the attacker interacts with Jira issues or requests a user is involved in, or if the attacker successfully intercepts emails with 'View Request' links sent to those users. Accounts with bot privileges and those associated with external single sign-on are especially vulnerable, making proper safeguards essential for maintaining user integrity.

Affected Version(s)

Jira Service Management Data Center before 5.3.3

Jira Service Management Data Center before 5.4.2

Jira Service Management Data Center before 5.5.1

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Atlassian
.