
Atlassian, an Australian software company that develops products for software developers, has published a security advisory to alert that its Jira and Jira Service Management products are affected by a critical authentication bypass vulnerability in Seraph, the company’s web application security framework.
Seraph is used in its Jira and Confluence products for handling all login and logout requests via a system of pluggable core elements.
The flaw is tracked as CVE-2022-0540, and comes with a severity rating of 9.9 out of 10 on the CVSS scoring system. It allows a remote attacker to bypass authentication by sending a specially crafted HTTP request to vulnerable endpoints.
The affects products are Jira Core Server, Jira Software Server, Jira Software Data Center, Jira Service Management Server, and Jira Service Management Data Center.
Only specific versions are impacted.
Users are strongly advised to update to one of the fixed versions. If this is not possible, Atlassian recommends updating the affected apps to a version that has remediated the risk, or disabling the vulnerable apps until patching is possible.
Read more about it here.