• Our channels:
  • Cyber Risk
  • Chief IT
  • Australian Security
  • Asia Pacific
  • Southeast Asia
  • Space
  • Smart Cities
  • Drones & Robotics
  • Video Systems
  • Podcast
  • MySec.TV
  • Best in Tech
  • MySmartTech
Australian Cyber Security Magazine
Navigate
  • Australian Cyber Security Magazine
  • News
    • Featured
    • Editor’s Desk
    • Skills & Training
    • Governance, Risk & Compliance
    • Hacking & Penetration Testing
    • Information Security
    • Strategy & Architecture
    • MySecurity TV
    • Cyber Security Weekly Podcast
  • Contributors
  • Magazines
  • Events
  • RESOURCES
  • TRAINING
  • SHOP
  • Advertise
  • Subscribe

Security Flaws in Atlassian’s Platform Led to Account Takeover in One Click

0
By ACSM on June 25, 2021 APP-ACSM, End-Point Security, Hacking & Penetration Testing, Network Security

Check Point Research (CPR) has claimed to have discovered security flaws in Atlassian, a platform used by 180,000 customers worldwide to engineer software and manage projects. With just one click, an attacker could have used the flaws get access to the Atlassian Jira bug system and get sensitive information such as security issues on Atlassian cloud, Bitbucket and on premise products.

  • CPR decided to investigate Atlassian, after growing curious about supply chain attacks since the SolarWinds incident
  • CPR bypassed Atlassian’s security measures, proving that an attacker could have injected malicious code, performed actions on behalf of users, and hijacked user sessions
  • CPR responsibly discloses research findings to Atlassian, who then deployed a fix

Jira is a leading software development tool used by over 65,000 customers, such as Visa, Cisco and Pfizer. Confluence is a remote-friendly team workspace used by over 60,000 customers, such as LinkedIn, NASA and the New York Times. Bitbucket is a Git-based source code repository hosting service. All these products can be used in a supply chain attack to target Atlassian partners and customers.

It should be noted the vulnerability affected several Atlassian-maintained websites, which support customers and partners. It does not affect Atlassian cloud-based or on-prem products.

Account Takeover 

CPR proved that account take over was possible on Atlassian accounts accessible by subdomains under atlassian.com. The subdomains found vulnerable were:

  • jira.atlassian.com
  • confluence.atlassian.com
  • getsupport.atlassian.com
  • partners.atlassian.com
  • developer.atlassian.com
  • support.atlassian.com
  • training.atlassian.com

Security Flaws 

The security flaws would have enabled an attacker to execute a number of possible malicious activities:

  • Cross-Site Scripting (XSS) attacks: malicious scripts are injected into websites and web applications for the purpose of running on the end user’s device.
  • Cross-site request forgery (CSRF) attacks: attacker induces users to perform actions that they do not intend to perform.
  • Session fixation attacks: attacker steals the established session between the client and the Web Server after the user logs in.

In other words, an attacker could use the security flaws found by CPR to take control over a victim’s account, perform actions on behalf of him, and gain access to Jira tickets. Furthermore, an attacker could have edited a company’s Confluence wiki, or view tickets at GetSupport. The attacker could have gone on to gain personal information. All of this could be accomplished in just one-click.

Attack Methodology 

To exploit the security flaws, an attacker’s order of operations would have been:

  1. Attacker lures victim into clicking on a crafted link (coming from the “Atlassian” domain), either from social media, a fake email or messaging app etc.
  2. By clicking on the link, the payload would send a request on behalf of the victim to the Atlassian platform, which would perform the attack and steal the user session.
  3. Attacker logs onto victim’s Atlassian apps associated with the account, gaining all the sensitive information that is stored there

Responsible Disclosure

CPR responsibly disclosed its research findings to Atlassian on January 8, 2021. Atlassian said that a fix was deployed on May 18, 2021.

Ever since the SolarWinds incidents last year, supply chain attacks have been in the forefront of CPR researchers’ interest. Since the Atlassian platforms are central to so many organisations workflows, an incredible amount of supply chain information flows through these applications CPR researchers began asking themselves what information could a malicious user get if they accessed a Jira or a Confluence account. This curiosity led them to review Atlassian’s platform, where these security flaws were found. In a world where distributed workforces increasingly depend on remote technologies, it is imperative to ensure these technologies have the best defences against malicious data extraction.

Share. Twitter Facebook Pinterest LinkedIn Tumblr Email

Related Posts

  • APP-ACSM | Featured | Technology | Women in CyberSecurity | May 21, 2025

    BT Helps Get More Women Into Cyber

  • APP-ACSM | Featured | Technology | May 20, 2025

    GitHub Releases Copilot Coding Agent

  • APP-ACSM | Featured | Technology | May 16, 2025

    Workato Completes Infosec Registered Assessors Program Assessment

ENJOY OUR OTHER CHANNELS

  • The Australian Cyber Security Magazine covers the broad domain of cybersecurity with news, updates and contributed articles from leading security professionals from
    across the world. The Editorial importantly sets the scene for a challenging threat landscape, with continued reports of serious data breaches.

    MySecurity Media Pty Limited
    ABN 54 145 849 056
    A: GPO Box 930 Sydney NSW 2001
    E: promoteme@mysecuritymedia.com
    W: www.mysecuritymedia.com

  • NETWORK

    • Marketplace
    • Community
    • Contributors
    • Lead Publication
    • Promote Your Brand
    • Privacy Policy
  • NEWS

    • Featured
    • Editor’s Desk
    • Skills & Training
    • Governance, Risk & Compliance
    • Hacking & Penetration Testing
    • Information Security
    • Strategy & Architecture
  • DOWNLOAD APP

  • EVENTS
    > Find a Speaker
    > New Arrivals
    > Upcoming Events
    > Past Events
    > Register an Event
  • RESOURCES
    > Reports
    > Whitepapers
    > Research
    > Books
    > COVID 19 Resources
    > Magazines
    > Podcasts
    > MySecurity TV
    > Australia in Space TV
  • PRODUCTS
    > Solution Products
    > Online Store
    > TeePublic Store
    > Promote Your Brand

    TRAINING
    > Courses
    > Webinars – Live
    > Webinars – On Demand
    > Learn Security Platform
  • COMMUNITY
    > Indo-Pacific Space and Earth Network
    > Space and Earth - Partners and Advisory
    > IPRAAC
    > IPSEC
    > Security & Risk Professional Insight Series
    > Women in Security Awards
    > Partners
    > Speakers
    > Providers
    > Promote Your Brand
  • NEWS CHANNELS
    > MySec.TV
    > Australia in Space TV
    > Cyber Security Weekly Podcast
    > Cyber Risk Leaders
    > Chief IT
    > Drones & Robotics
    > Space & Defense
    > Australia in Space
    > Smart Cities Tech
    > Video Systems
    > Asia Pacific Security Magazine
    > ASEAN Technology & Security
    > Australian Cyber Security Magazine
    > Australian Security Magazine

© My Security Media. All Right Reserved 2019.   Privacy Policy | Terms & Conditions | Competition T&Cs