First published: Wed Apr 20 2022(Updated: )
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.13.8 | |
Atlassian Jira Data Center | >=8.14.0<8.20.6 | |
Atlassian Jira Data Center | >=8.21.0<8.22.0 | |
Atlassian Jira Server | <8.13.8 | |
Atlassian Jira Server | >=8.14.0<8.20.6 | |
Atlassian Jira Server | >=8.21.0<8.22.0 | |
Atlassian Jira Service Management | <4.13.8 | |
Atlassian Jira Service Management | <4.13.18 | |
Atlassian Jira Service Management | >=4.14.0<4.20.6 | |
Atlassian Jira Service Management | >=4.14.0<4.20.6 | |
Atlassian Jira Service Management | >=4.21.0<4.22.0 | |
Atlassian Jira Service Management | >=4.21.0<4.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0540 is a vulnerability in Jira Seraph that allows a remote unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request.
CVE-2022-0540 affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0.
CVE-2022-0540 has a severity score of 9.8, which is considered critical.
The official reference for CVE-2022-0540 can be found at the Atlassian Jira Security Advisory released on April 20, 2022.
To fix CVE-2022-0540, it is recommended to upgrade to Atlassian Jira Server or Data Center versions 8.13.18, 8.20.6, or 8.22.0, depending on the current version you are running.