Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-0540Improper Authentication in Atlassian Jira Core Server

Severity
9.8CRITICALNVD
EPSS
92.4%
top 0.27%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 20
Latest updateApr 21

Description

A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages8 packages

CVEListV5atlassian/jira_service_management_data_centerunspecified4.13.18+4
NVDatlassian/jira_data_center8.14.08.20.6+2
CVEListV5atlassian/jira_software_data_centerunspecified8.13.18+4
CVEListV5atlassian/jira_service_management_serverunspecified4.13.18+4
NVDatlassian/jira_server8.14.08.20.6+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-h5cm-vc68-69h9: A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request2022-04-21
CVEList
CVE-2022-0540: A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request2022-04-20
VulnCheck
Atlassian Jira Server and Data Center Authentication Bypass Vulnerability2022

💥Exploits & PoCs

1
Nuclei
Atlassian Jira Seraph - Authentication Bypass
CVE-2022-0540 — Improper Authentication in Atlassian | cvebase