Advisory Release Date
17 November 2020
CUTE for Jira CUTE for Confluence
all version until version 1.5.2
We were able to identify security vulnerabilities in the configuration of our CUTE apps.
The second kind of vulnerability allows a cross-site request forgery (XSRF) attack to the configuration of the CUTE apps. The attack could be used to trick a Confluence/Jira administrator administrator into performing any action in the CUTE configuration that attackers chooses . This vulnerabilities have been rated as P2 (High) according to the scale published under the Bugcrowd’s Vulnerability Rating Taxonomy (VRT).
The last kind of vulnerability allows a Confluence/Jira administrator execute code they choose on the server of Confluence/Jira. This vulnerabilities have been rated as P1 (Critical) according to the scale published under the Bugcrowd’s Vulnerability Rating Taxonomy (VRT).
The XSRF vulnerability is due to the lack of a XSRF security tokens.
The remote code execution vulnerabilities are caused by our apps being vulnerable to path traversal attacks, which allow the attacker to place files in arbitrary folders in the file system that could then be executed.
If you are using the CUTE app with any version before 1.5.3, please upgrade to at least version 1.5.3.