CWE
287 180
Advisory Published
Updated

CVE-2022-26136

First published: Wed Jul 20 2022(Updated: )

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.

Credit: security@atlassian.com

Affected SoftwareAffected VersionHow to fix
Atlassian Bamboo>=7.2.0<7.2.10
Atlassian Bamboo>=8.0.0<8.0.9
Atlassian Bamboo>=8.1.0<8.1.8
Atlassian Bamboo>=8.2.0<8.2.4
Atlassian Bitbucket<7.6.16
Atlassian Bitbucket>=7.7.0<7.17.8
Atlassian Bitbucket>=7.18.0<7.19.5
Atlassian Bitbucket>=7.20.0<7.20.2
Atlassian Bitbucket>=7.21.0<7.21.2
Atlassian Bitbucket=8.0.0
Atlassian Bitbucket=8.1.0
Atlassian Confluence Data Center<7.4.17
Atlassian Confluence Data Center>=7.5.0<7.13.7
Atlassian Confluence Data Center>=7.14.0<7.14.3
Atlassian Confluence Data Center>=7.15.0<7.15.2
Atlassian Confluence Data Center>=7.16.0<7.16.4
Atlassian Confluence Data Center>=7.17.0<7.17.4
Atlassian Confluence Data Center=7.18.0
Atlassian Confluence Server<7.4.17
Atlassian Confluence Server>=7.5.0<7.13.7
Atlassian Confluence Server>=7.14.0<7.14.3
Atlassian Confluence Server>=7.15.0<7.15.2
Atlassian Confluence Server>=7.16.0<7.16.4
Atlassian Confluence Server>=7.17.0<7.17.4
Atlassian Confluence Server=7.18.0
Atlassian Crowd<4.3.8
Atlassian Crowd>=4.4.0<4.4.2
Atlassian Crowd=5.0.0
Atlassian Crucible<4.8.10
Atlassian FishEye<4.8.10
Atlassian Jira Data Center>=8.13.0<8.13.22
Atlassian Jira Data Center>=8.14.0<8.20.10
Atlassian Jira Data Center>=8.21.0<8.22.4
Atlassian Jira Server>=8.13.0<8.13.22
Atlassian Jira Server>=8.14.0<8.20.10
Atlassian Jira Server>=8.21.0<8.22.4
Atlassian Jira Service Desk<4.13.22
Atlassian Jira Service Desk<4.13.22
Atlassian Jira Service Management>=4.14.0<4.20.10
Atlassian Jira Service Management>=4.14.0<4.20.10
Atlassian Jira Service Management>=4.21.0<4.22.4
Atlassian Jira Service Management>=4.21.0<4.22.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-26136?

    CVE-2022-26136 is a vulnerability in multiple Atlassian products that allows a remote unauthenticated attacker to bypass Servlet Filters used by first and third-party apps, potentially resulting in authentication bypass and other security issues.

  • Which Atlassian products are affected by CVE-2022-26136?

    Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence Data Center, Atlassian Confluence Server, Atlassian Crowd, Atlassian Crucible, Atlassian FishEye, Atlassian Jira Data Center, Atlassian Jira Server, Atlassian Jira Service Desk, and Atlassian Jira Service Management are affected by CVE-2022-26136.

  • What is the severity of CVE-2022-26136?

    CVE-2022-26136 has a severity rating of 9.8, which is considered critical.

  • How can the vulnerability be exploited?

    The vulnerability can be exploited by a remote unauthenticated attacker who can bypass Servlet Filters used by first and third-party apps.

  • Are there any patches or updates available for CVE-2022-26136?

    Yes, Atlassian has released patches and updates to address the vulnerability. It is recommended to update the affected products to the latest versions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203