Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution

December 06, 2023NewsroomSoftware Security / Vulnerability


Atlassian has released software fixes to address this four critical errors in its software that, if successfully exploited, could result in remote code execution.

The list of vulnerabilities is below –

  • CVE-2022-1471 (CVSS score: 9.8) – Deserialization vulnerability in the SnakeYAML library that could lead to remote code execution in many products
  • CVE-2023-22522 (CVSS score: 9.0) – Remote code execution vulnerability in Confluence Data Center and Confluence Server (affects all versions including and after 4.0.0)
  • CVE-2023-22523 (CVSS score: 9.8) – Remote code execution vulnerability in Asset Discovery for Jira Service Management Cloud, Server, and Data Center (affects all versions up to but not including 3.2.0-cloud / 6.2.0 data center and server)
  • CVE-2023-22524 (CVSS score: 9.6) – Remote code execution vulnerability in the Atlassian Companion app for macOS (affects all versions up to but not including 2.0.0)

Atlassian describes CVE-2023-22522 as a template injection flaw that allows an authenticated attacker, including one with anonymous access, to inject insecure user input into a Confluence page, which result in code execution.


The Assets Discovery flaw allows an attacker to perform privileged remote code execution on machines that have the Assets Discovery agent installed, while CVE-2023-22524 could allow an attacker to achieve ot code execution by using WebSockets to bypass Atlassian Companion’s blocklist and macOS Gatekeeper protections.

The advisory comes nearly a month after the Australian software company Revelation all versions of Bamboo Data Center and its Server products are affected by an actively exploited critical security flaw in Apache ActiveMQ (CVE-2023-46604, CVSS score: 10.0). Fixes are released in versions 9.2.7, 9.3.5, and 9.4.1 or later.

With Atlassian products becoming useful attack vectors in recent years, it is recommended that users act quickly to update affected installations to a patched version.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Leave a comment