Atlassian prepping Jira Server patch

By

Fixing crashable third-party vulnerabilities.

Atlassian has told iTnews it is working on fixes for two as-yet-unannounced vulnerabilities in its Jira Server software.

Atlassian prepping Jira Server patch

The vulnerabilities are present not in Atlassian’s own software, but in the third-party Jackson JSON suite of data processing tools for Java.

CVE-2022-42003 and CVE-2022-42004 are both deserialisation bugs in the jackson-databind library.

Both carry a high CVSS severity score of 7.5.

In CVE-2022-42003, “a lack of a check in primitive value deserializers to avoid deep wrapper array nesting” provides the attack vector. An attacker could send malicious content that could crash the library.

CVE-2022-42004 is similar: multiple nested JSON arrays can crash the BeanDeserializer._deserializeFromArray function.

The bugs affect FasterXML jackson-databind before 2.14.0-rc1. Micro-patches have also shipped for versions 2.13.4.2 and 2.12.7.1.

An Atlassian spokesperson acknowledged the vulnerabilities are present in Jira Server, which uses the libraries, after the issue came to iTnews’ attention.

“This is a known issue and we are working on it. In accordance with our security bug fix policy, customers can expect a fix within 90 days from when the issue was verified”, the spokesprson said.

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

CBA using facial recognition logins to verify disputed payments

CBA using facial recognition logins to verify disputed payments

Qantas contacted by "potential cyber criminal"

Qantas contacted by "potential cyber criminal"

SA Power Networks tackles IAM, cloud security under five-year strategy

SA Power Networks tackles IAM, cloud security under five-year strategy

Qantas facing 'significant' data theft after cyber attack

Qantas facing 'significant' data theft after cyber attack

Log In

  |  Forgot your password?