Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions from 3.0.2 before 6.6.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
References
Configurations
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-a%5B%E2%80%A6%5Dypass-of-app-qsh-verification-via-context-jwts/47072 - | |
References | () https://confluence.atlassian.com/pages/viewpage.action?pageId=1051986099 - Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210604-0004/ - Third Party Advisory |
07 Nov 2023, 03:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-04-16 03:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-26073
Mitre link : CVE-2021-26073
CVE.ORG link : CVE-2021-26073
JSON object : View
Products Affected
atlassian
- connect_express
CWE
CWE-287
Improper Authentication