Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-12896 | Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions from 3.0.2 before 6.6.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. |
Github GHSA |
GHSA-4v96-m8xv-x83v | Broken Authentication in Atlassian Connect Express |
Wed, 12 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2025-02-12T20:46:54.554Z
Reserved: 2021-01-25T00:00:00.000Z
Link: CVE-2021-26073
Updated: 2024-08-03T20:19:19.387Z
Status : Modified
Published: 2021-04-16T03:15:12.033
Modified: 2025-02-12T21:15:10.297
Link: CVE-2021-26073
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA