CVE-2022-26137
Bamboo vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2022-26137) discovered in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. The vulnerability affects multiple Atlassian Server and Data Center products including Bamboo, Bitbucket, Confluence, Crowd, Fisheye, Crucible, Jira, and Jira Service Management. Atlassian Cloud instances are not affected as patches have been deployed (Atlassian Advisory).

Technical details

The vulnerability exists in how Atlassian products implement Servlet Filters, which are used to intercept and process HTTP requests before they reach backend resources. A remote attacker can exploit this by sending specially crafted HTTP requests that cause additional Servlet Filters to be invoked during request/response processing. The most significant confirmed security issue is a cross-origin resource sharing (CORS) bypass, where an attacker can invoke the Servlet Filter used to respond to CORS requests. The vulnerability has been assigned a CVSS score of 9.4 (Critical) (Atlassian Advisory, Arctic Wolf).

Impact

The primary impact is that an attacker who can trick a user into requesting a malicious URL can access the vulnerable application with the victim's permissions through CORS bypass. The vulnerability could potentially lead to authentication bypass and cross-site scripting (XSS) attacks depending on which filters are used by each application (Atlassian Advisory).

Mitigation and workarounds

Atlassian has released security patches for all affected products and recommends upgrading to the fixed versions. There are no known workarounds for this vulnerability. Organizations should update their Atlassian products to the latest patched versions as specified in the security advisory. For example, Bamboo Server users should upgrade to versions 7.2.9 or later, Bitbucket Server to 7.6.16 or later, and Confluence Server to 7.4.17 or later (Atlassian Advisory).

Additional resources


SourceThis report was generated using AI

Related Bamboo vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-1597CRITICAL9.8
  • JavaJava
  • postgresql-jdbc
NoYesFeb 19, 2024
CVE-2023-46604CRITICAL9.8
  • JavaJava
  • org.apache.activemq:activemq-client
YesYesOct 27, 2023
CVE-2023-22516HIGH8.8
  • BambooBamboo
  • bamboo
NoYesNov 21, 2023
CVE-2024-21687HIGH8.1
  • BambooBamboo
  • cpe:2.3:a:atlassian:bamboo
NoYesJul 16, 2024
CVE-2024-21689HIGH8
  • BambooBamboo
  • bamboo
NoYesAug 20, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management