Contents
Multiple Products Security Advisory - Servlet Filter Dispatcher Vulnerabilities - CVE-2022-26136, CVE-2022-26137
Dear customer,
on the 20th of July 2022 10 PM CEST, Atlassian issued two Security Advisories for it's on-premise software products and the Confluence app Questions for Confluence. The Cloud versions of the applications are not affected.
What you need to know
Atlassian has been made aware of a critical vulnerability in their on-premise software products via Arbitrary Servlet Filter Bypass and Additional Servlet Filter Invocation. Further details about the vulnerability are available in Atlassians announcement, Multiple Products Security Advisory - 2022-07-20.
The only current way to secure the applications, is updating to fixed versions. bitvoodoo highly recommends using LTS releases of Jira and Confluence.
Affected Versions
Product | Affected Versions |
---|---|
Bamboo Server and Data Center |
|
Bitbucket Server and Data Center |
|
Confluence Server and Data Center |
|
Crowd Server and Data Center |
|
Crucible |
|
Fisheye |
|
Jira Server and Data Center |
|
Jira Service Management Server and Data Center |
|
Fixed Versions
Product | Fixed Versions |
---|---|
Bamboo Server and Data Center |
|
Bitbucket Server and Data Center | |
Confluence Server and Data Center | |
Crowd Server and Data Center |
|
Crucible |
|
Fisheye |
|
Jira Server and Data Center |
|
Jira Service Management Server and Data Center |
|
What should I do?
You use the Server or Data Center variant of any Atlassian application in a version listed in Affected Versions.
Update
Update to a version listed in Fixed Versions.
Workaround
There are currently no workarounds!
You use the Cloud variant of any Atlassian application.
You are not affected by this Security Advisory.
No need for action.
You use the Server or Data Center variant of any Atlassian application in a version listed in Affected Versions.
Update
Ask bitvoodoo to update to a version listed in Fixed Versions.
LTS Update Package Customers will get an update to the latest LTS release free of charge as soon as possible.
Workaround
There are currently no workarounds!
Further Reading
- CVE...
- ...
Support
If you still have questions or concerns regarding this advisory, please contact the bitvoodoo support via support.bitvoodoo.ch.