Article Details
Scrape Timestamp (UTC): 2023-12-06 15:54:00.504
Original Article Text
Click to Toggle View
Atlassian patches critical RCE flaws across multiple products. Atlassian has published security advisories for four critical remote code execution (RCE) vulnerabilities impacting Confluence, Jira, and Bitbucket servers, along with a companion app for macOS. All security issues addressed received a critical-severity score of at least 9.0 out of 10, based on Atlassian's internal assessment. However, the company advises companies to evaluate applicability according to their IT environment. The company marked none of the security issues as being exploited in the wild. However, due to the popularity of Atlassian products and their extensive deployment in corporate environments, system administrators should prioritize applying the available updates. The set of four RCE vulnerabilities addressed this month are received the following identifiers: To address all four of the above problems, users are recommended to update to one of the following product versions: If uninstalling Asset Discovery agents to apply the patch for CVE-2023-22523 is not possible at the moment or has to be delayed, Atlassian provides a temporary mitigation that consists in blocking the port used for communication with agents, which by default is 51337. In the case of CVE-2023-22522, there is no mitigation solution. If administrators cannot apply the patch immediately, Atlassian recommends administrators to backup affected instances and take them offline. If administrators are unable to apply the patch for CVE-2023-22524, the company recommends uninstalling the Atlassian Companion App.
Daily Brief Summary
Atlassian has released security advisories concerning four critical remote code execution vulnerabilities affecting Confluence, Jira, and Bitbucket servers, along with an Atlassian Companion app for macOS.
All vulnerabilities are rated as critical, with a severity score of at least 9.0 out of 10, although there are no reports of these issues being exploited in the wild.
Atlassian urges system administrators to swiftly apply the updates due to the widespread use of their products within corporate IT environments.
The four RCE vulnerabilities patched have unique identifiers, and updates are available to remediate these flaws.
For CVE-2023-22523, Atlassian suggests a temporary workaround of blocking the communication port if the patch cannot be immediately applied or the Asset Discovery agents cannot be uninstalled.
No mitigation is available for CVE-2023-22522, and Atlassian recommends backups and taking affected instances offline if patches can't be installed promptly.
If the Atlassian Companion App patch for CVE-2023-22524 cannot be applied, removing the app is the recommended course of action.