Article Details
Scrape Timestamp (UTC): 2024-01-16 18:14:43.747
Source: https://www.theregister.com/2024/01/16/patch_vmware_atlassian/
Original Article Text
Click to Toggle View
Double trouble for VMware and Atlassian admins – critical flaws to fix. You didn't have anything else to do this Tuesday, right?. VMware and Atlassian today disclosed critical vulnerabilities and, while neither appear to have been exploited by miscreants yet, admins should patch now to avoid disappointment. First off, a pair of issues from Atlassian. Most serious is CVE-2023-22527, a template injection flaw that can allow unauthenticated remote code execution (RCE) attacks. It scored a perfect CVSS rating of 10 out of 10 and affects Confluence Data Center and Server 8 versions released before December 5, 2023 and 8.4.5, which no longer receives fixes. The solution: "immediately" patch each affected installation by updating to the latest available version, according to the vendor. Atlassian also released fixes for a high-severity flaw was found in the FasterXML Jackson Databind code used in versions 8.20.0, 9.4.0, 9.5.0, and 9.6.0 of Jira Software Data Center and Server. The 7.5-rated bug, tracked as CVE-2020-25649, could allow XML external entity (XXE) attacks in which miscreants could mess with data integrity. So in addition to updating Confluence, it's also a good idea to upgrade to the latest version of Jira Software Data Center and Server, the collaboration biz advises. Moving on to the critical VMware bug, CVE-2023-34063. This one is a missing access control problem in all versions of Aria Automation earlier of 8.16. Be aware that this infrastructure automation product may be included in VMware Cloud Foundation. The bug earned a 9.9 CVSS rating, and VMware warns that successful exploitation can allow unauthorized access to remote organizations and workflows. Luckily this one also has a fix, so upgrade to VMware Aria Automation 8.16, and then apply the patch. As the virtualization giant notes:"The only supported upgrade path after applying the patch is to version 8.16. VMware strongly recommends this version. If you upgrade to an intermediate version, the vulnerability will be reintroduced, requiring an additional round of patching." VMware isn't aware of any reports of exploitation "as of now." But it's safe to assume that would-be attackers are already scanning for vulnerable installations, so make sure to apply the fix before the software vendor is forced to update its advisory.
Daily Brief Summary
Atlassian revealed a critical remote code execution flaw, CVE-2023-22527, affecting Confluence Data Center and Server, rated a perfect 10 on the CVSS scale.
An additional high-severity vulnerability, CVE-2020-25649, impacting Jira Software Data Center and Server, could allow XML external entity attacks.
Atlassian's advice for administrators is to promptly update to the latest versions of Confluence and Jira Software to mitigate the risks.
VMware disclosed a serious access control vulnerability, CVE-2023-34063, affecting all versions of Aria Automation before 8.16, with a CVSS score of 9.9.
VMware recommends upgrading to Aria Automation 8.16 and applying the patch to prevent unauthorized access to organizations and workflows.
Both companies are currently unaware of any exploitation of these vulnerabilities but stress the importance of immediate updating as attackers may already be searching for unpatched systems.