Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. atlassian-connect-express
  4. ›
  5. CVE-2021-26073

CVE-2021-26073: Broken Authentication in Atlassian Connect Express

May 24, 2022 (updated February 12, 2025)

Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions between 3.0.2 - 6.5.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.

References

  • community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-a%5B%E2%80%A6%5Dypass-of-app-qsh-verification-via-context-jwts/47072
  • confluence.atlassian.com/pages/viewpage.action?pageId=1051986099
  • github.com/advisories/GHSA-4v96-m8xv-x83v
  • nvd.nist.gov/vuln/detail/CVE-2021-26073
  • security.netapp.com/advisory/ntap-20210604-0004

Code Behaviors & Features

Detect and mitigate CVE-2021-26073 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.2 before 6.6.0

Fixed versions

  • 6.6.0

Solution

Upgrade to version 6.6.0 or above.

Impact 7.7 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication
  • CWE-863: Incorrect Authorization

Source file

npm/atlassian-connect-express/CVE-2021-26073.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:42 +0000.