9.8
CVSSv3

CVE-2022-0540

Published: 20/04/2022 Updated: 08/08/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A vulnerability in Jira Seraph allows a remote, unauthenticated malicious user to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions prior to 8.13.18, versions 8.14.0 and later prior to 8.20.6, and versions 8.21.0 and later prior to 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions prior to 4.13.18, versions 4.14.0 and later prior to 4.20.6, and versions 4.21.0 and later prior to 4.22.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian jira service management

atlassian jira data center

atlassian jira server

Vendor Advisories

Check Point Reference: CPAI-2022-1985 Date Published: 11 Jan 2024 Severity: Critical ...

Github Repositories

Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)

Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540) English • 中文 Exploit Details As seen in author's blog, atlassian provided a long list of affected plugins (the vast majority of which were false positives), and the author listed several actual affected plugins According to the prompted conditions, combined with the Official documentation fo