<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Atlassian Vulnerabilities in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Atlassian-Vulnerabilities/m-p/56133#M3783</link>
    <description>&lt;P&gt;If you believe you have found a security issue that meets Atlassian’s definition of a vulnerability, please submit the report to our security team via one of the methods below: Only vulnerabilities submitted through our bug bounty program are eligible to receive a bounty payment. Please include the following information in your report:&amp;nbsp;&lt;A href="https://www.myhtspace.net/" target="_self"&gt;&lt;FONT color="#FFFFFF"&gt;My HT Space&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Dec 2022 04:11:52 GMT</pubDate>
    <dc:creator>King69</dc:creator>
    <dc:date>2022-12-23T04:11:52Z</dc:date>
    <item>
      <title>Atlassian Vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Atlassian-Vulnerabilities/m-p/56027#M3758</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to this report there is a whole load of Atlassian products with security flaws, which are used in a lot of organisations these days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cloudsek.com/security-flaw-in-atlassian-products-jira-confluencetrello-bitbucket-affecting-multiple-companies/" target="_blank"&gt;https://cloudsek.com/security-flaw-in-atlassian-products-jira-confluencetrello-bitbucket-affecting-multiple-companies/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:23:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Atlassian-Vulnerabilities/m-p/56027#M3758</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: Atlassian Vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Atlassian-Vulnerabilities/m-p/56133#M3783</link>
      <description>&lt;P&gt;If you believe you have found a security issue that meets Atlassian’s definition of a vulnerability, please submit the report to our security team via one of the methods below: Only vulnerabilities submitted through our bug bounty program are eligible to receive a bounty payment. Please include the following information in your report:&amp;nbsp;&lt;A href="https://www.myhtspace.net/" target="_self"&gt;&lt;FONT color="#FFFFFF"&gt;My HT Space&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2022 04:11:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Atlassian-Vulnerabilities/m-p/56133#M3783</guid>
      <dc:creator>King69</dc:creator>
      <dc:date>2022-12-23T04:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Atlassian Vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Atlassian-Vulnerabilities/m-p/56144#M3785</link>
      <description>&lt;P&gt;At first blush, three observations:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;30 day cookies - that leaves a pretty big window of opportunity that seems mostly driven by "user experience." I suspect the driver is integration with a mobile app. We're used to logging in/using password managers with a web browsers, but in thumb-click rush of the mobile experience, we demand more authentication persistence.&lt;/LI&gt;&lt;LI&gt;Email addresses buried in the cookie - All a cookie should be is some random ID that can then be married to a database. There is no need to store such identifying data ... UNLESS you are trying to do tracking with partners or something similar.&lt;/LI&gt;&lt;LI&gt;2FA - No, it doesn't seem to be 2FA.&amp;nbsp; This seems to be shortcut authentication where if you have the token you don't have to use an additional means of authentication.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Still, all of this seems more proof of concept (maybe I missed something), but seems like CloudSek hacked itself (using its own cookies). Fundamentally, the issue is is there anything in these Atlassian applications that give up their cookies? I don't see that reported (although, apparently Atlassian cookies can be found for sale) While it is true that if someone gets their hands on a device, they then can get access to someone's cookies, if they have that kind of access, they can also get at password managers and the like. It's kind of game-over at that point anyway. I don't know if this all warrants alarm, but there certainly seem to be teachable and fixable moments here.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 14:22:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Atlassian-Vulnerabilities/m-p/56144#M3785</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2022-12-22T14:22:49Z</dc:date>
    </item>
  </channel>
</rss>

