CVE-2024-21401: Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability

Overview

Severity
Critical (CVSS 9.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Feb
Released
2024-02-13
EPSS Score
2.23% (percentile: 84.5%)

FAQ

How could an attacker exploit this vulnerability? An unauthenticated attacker (PR:N) could exploit this vulnerability by running a script to access a targeted Jira server over the internet. Is there any action I need to take to be protected from this vulnerability? Customers running the Azure AD Jira sso plugin need to update to version 1.1.2 from the Microsoft Download Center or from Atlassian Marketplace. What privileges could an attacker gain with successful exploitation of this vulnerability? An attacker does not need to login to exploit this vulnerability. Exploiting this vulnerability could allow an attacker to fully update Entra ID SAML metadata and info for the plugin. The attacker could then change the authentication of the application to their tenant as needed.

Affected Products (1)

Azure

  • Microsoft Entra Jira Single-Sign-On Plugin

Security Updates (1)

Acknowledgments

<a href="https://www.linkedin.com/in/thongvv3/">thongvv of GE Security (VNG)</a>

Revision History

  • 2024-02-13: Information published.