First published: Wed Jul 20 2022(Updated: )
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Bamboo | >=7.2.0<7.2.10 | |
Atlassian Bamboo | >=8.0.0<8.0.9 | |
Atlassian Bamboo | >=8.1.0<8.1.8 | |
Atlassian Bamboo | >=8.2.0<8.2.4 | |
Atlassian Bitbucket | <7.6.16 | |
Atlassian Bitbucket | >=7.7.0<7.17.8 | |
Atlassian Bitbucket | >=7.18.0<7.19.5 | |
Atlassian Bitbucket | >=7.20.0<7.20.2 | |
Atlassian Bitbucket | >=7.21.0<7.21.2 | |
Atlassian Bitbucket | =8.0.0 | |
Atlassian Bitbucket | =8.1.0 | |
Atlassian Confluence Data Center | <7.4.17 | |
Atlassian Confluence Data Center | >=7.5.0<7.13.7 | |
Atlassian Confluence Data Center | >=7.14.0<7.14.3 | |
Atlassian Confluence Data Center | >=7.15.0<7.15.2 | |
Atlassian Confluence Data Center | >=7.16.0<7.16.4 | |
Atlassian Confluence Data Center | >=7.17.0<7.17.4 | |
Atlassian Confluence Data Center | =7.18.0 | |
Atlassian Confluence Server | <7.4.17 | |
Atlassian Confluence Server | >=7.5.0<7.13.7 | |
Atlassian Confluence Server | >=7.14.0<7.14.3 | |
Atlassian Confluence Server | >=7.15.0<7.15.2 | |
Atlassian Confluence Server | >=7.16.0<7.16.4 | |
Atlassian Confluence Server | >=7.17.0<7.17.4 | |
Atlassian Confluence Server | =7.18.0 | |
Atlassian Crowd | <4.3.8 | |
Atlassian Crowd | >=4.4.0<4.4.2 | |
Atlassian Crowd | =5.0.0 | |
Atlassian Crucible | <4.8.10 | |
Atlassian FishEye | <4.8.10 | |
Atlassian Jira Data Center | >=8.13.0<8.13.22 | |
Atlassian Jira Data Center | >=8.14.0<8.20.10 | |
Atlassian Jira Data Center | >=8.21.0<8.22.4 | |
Atlassian Jira Server | >=8.13.0<8.13.22 | |
Atlassian Jira Server | >=8.14.0<8.20.10 | |
Atlassian Jira Server | >=8.21.0<8.22.4 | |
Atlassian Jira Service Desk | <4.13.22 | |
Atlassian Jira Service Desk | <4.13.22 | |
Atlassian Jira Service Management | >=4.14.0<4.20.10 | |
Atlassian Jira Service Management | >=4.14.0<4.20.10 | |
Atlassian Jira Service Management | >=4.21.0<4.22.4 | |
Atlassian Jira Service Management | >=4.21.0<4.22.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26136 is a vulnerability in multiple Atlassian products that allows a remote unauthenticated attacker to bypass Servlet Filters used by first and third-party apps, potentially resulting in authentication bypass and other security issues.
Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence Data Center, Atlassian Confluence Server, Atlassian Crowd, Atlassian Crucible, Atlassian FishEye, Atlassian Jira Data Center, Atlassian Jira Server, Atlassian Jira Service Desk, and Atlassian Jira Service Management are affected by CVE-2022-26136.
CVE-2022-26136 has a severity rating of 9.8, which is considered critical.
The vulnerability can be exploited by a remote unauthenticated attacker who can bypass Servlet Filters used by first and third-party apps.
Yes, Atlassian has released patches and updates to address the vulnerability. It is recommended to update the affected products to the latest versions.