First published: Mon Aug 02 2021(Updated: )
The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian SAML Single Sign-On | <2.5.9 | |
Atlassian SAML Single Sign-On | <2.5.9 | |
Atlassian SAML Single Sign-On | <2.5.9 | |
Atlassian SAML Single Sign-On | <3.5.6 | |
Atlassian SAML Single Sign-On | <3.6.6.1 | |
Atlassian SAML Single Sign-On | >=3.0.0<3.6.6 | |
Atlassian SAML Single Sign-On | >=3.0.0<3.6.6 | |
Atlassian SAML Single Sign-On | >=3.6.0<3.6.6.1 | |
Atlassian SAML Single Sign-On | >=4.0.0<4.0.12 | |
Atlassian SAML Single Sign-On | >=4.0.0<4.0.12 | |
Atlassian SAML Single Sign-On | >=4.0.0<4.0.12 | |
Atlassian SAML Single Sign-On | >=4.0.0<4.0.12 | |
Atlassian SAML Single Sign-On | >=5.0.0<5.0.5 | |
Atlassian SAML Single Sign-On | >=5.0.0<5.0.5 | |
Atlassian SAML Single Sign-On | >=5.0.0<5.0.5 | |
Atlassian SAML Single Sign-On | >=5.0.0<5.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37843 has a critical severity level due to the potential for remote attackers to exploit it without requiring any additional authentication beyond knowing the username.
To fix CVE-2021-37843, update your Atlassian SAML SSO apps to the fixed versions: Jira 3.6.6.1, 4.0.12, 5.0.5; Confluence 3.6.6, 4.0.12, 5.0.5; Bitbucket 2.5.9, 3.6.6.
CVE-2021-37843 affects multiple Atlassian products utilizing the SAML SSO apps, including Jira, Confluence, Bitbucket, and FishEye.
Exploiting CVE-2021-37843 allows an attacker to gain unauthorized access to a user account solely with knowledge of the username.
As of now, there are no known workarounds for CVE-2021-37843, and patching to the latest versions is the recommended solution.