First published: Wed Apr 04 2018(Updated: )
The OAuth status rest resource in Atlassian Application Links before version 5.2.7, from 5.3.0 before 5.3.4 and from 5.4.0 before 5.4.3 allows remote attackers with administrative rights to access the content of internal network resources via a Server Side Request Forgery (SSRF) by creating an OAuth application link to a location they control and then redirecting access from the linked location's OAuth status rest resource to an internal location. When running in an environment like Amazon EC2, this flaw maybe used to access to a metadata resource that provides access credentials and other potentially confidential information.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Application Links | <5.2.7 | |
Atlassian Application Links | >=5.3.0<5.3.4 | |
Atlassian Application Links | >=5.4.0<5.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18096 is a vulnerability in Atlassian Application Links that allows remote attackers with administrative rights to access internal network resources.
The severity of CVE-2017-18096 is rated as high with a CVSS score of 7.2.
Atlassian Application Links versions up to 5.2.7, 5.3.0 to 5.3.4, and 5.4.0 to 5.4.3 are affected by CVE-2017-18096.
CVE-2017-18096 works by allowing attackers with administrative rights to create an OAuth request that triggers a Server Side Request Forgery (SSRF) and gains access to internal network resources.
Yes, upgrading Atlassian Application Links to version 5.2.7, 5.3.4, or 5.4.3 will fix CVE-2017-18096.