Improved Security: Atlassian Addresses Multiple Critical Vulnerabilities with Patches

Atlassian has released patches to address several critical vulnerabilities. The first vulnerability, CVE-2023-22522, is a template injection vulnerability in Confluence Data Centre and Confluence Server. This vulnerability allows an attacker to inject unsafe user input into a Confluence page, granting them remote code execution. It affects all versions of Confluence Data Centre and Server after version 4.0.0, and users are advised to upgrade to a fixed version.

Another vulnerability, CVE-2023-22524, is a remote code execution vulnerability in the Atlassian Companion App for MacOS. Attackers can use WebSockets to bypass the app’s blocklist and MacOS Gatekeeper, enabling the execution of code.

CVE-2023-22523 is a critical-rated bug in Asset Discovery in Jira Service Management Cloud, Server, and Data Centre. This vulnerability exists between the Assets Discovery application and the Assets Discovery agent, allowing attackers to gain privileged remote code execution.

Lastly, CVE-2022-1471 is a remote code execution deserialization bug in the SnakeYAML library, which is utilized in multiple Atlassian products such as Automation for Jira, BitBucket, Confluence, and Jira configurations. Patches are available for affected versions of these products.

Unlock your business potential with our expert guidance. Get in touch now!


NasuniIQ Introduces Visual Representation for Handling Large Unstructured Datasets


Top 7 Todoist Alternatives & Competitors to Consider in 2024


Birmingham City Council Seeks an Additional £45m to Address Critical Issues with Oracle System


Discover 6 PowerShell Courses That Teach Automating Admin Tasks at $20


Switch to Pure results in music agency cutting space and energy costs by half


A Comparison of Payroll Software: Square Payroll vs OnPay for 2024


Tech Diversity Hindered by Misunderstandings and Underrepresentation