Last Updated: 2023-11-06 13:40:13 UTC
by Johannes Ullrich (Version: 1)
Last week, Atlassian published an advisory for CVE-2023-22518. The vulnerability is a trivial to exploit authentication bypass vulnerability . Atlassian emphasized the importance of the advisory with a quote from its CISO: "There are no reports of active exploitation at this time; customers to protect their instances." On Friday, Atlassian confirmed that attackers are actively exploiting the vulnerability.
The vulnerability is rated with a CVSS score of 9.1. Three different URLs are affected according to the advisory:
Looking at different published exploits, the other common denominator is the addition of a, in hindsight, obvious header:
One of the exploits is also hitting this URL
I went back through our data to see how much exploitation we see for these URLs. We started seeing the first attempts on November 2nd (Thursday), just as Atlassian reported seeing these exploits being used against customers.
The first request detected came in on Nov 2nd from %%IP:126.96.36.199%%. The IP is a Digital Ocean IP and pretty quiet, but no stranger to our logs. We saw two requests back in March for /t4 (WebLogic?) .
The total request sent by this IP on November 2nd:
GET /json/setup-restore.action HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2919.83 Safari/537.36
This request is still missing the "X-Atlassian-Token" header. It may just be an attempt to collect targets. The host this was sent to is interestingly responding to a hostname related to a fictitious medical organization, and this particular hostname was used in the request. The source IP also attempted TLS connections and first sent a simple "HEAD" request for the index page to confirm connectivity.
Other early IPs scanning for the vulnerability:
188.8.131.52 Indian IP address with no prior history.
184.108.40.206 Indian IP address with no previous record.
220.127.116.11 US-based cloud provider (vultr.com)
18.104.22.168 Canadian Consumer IP address (Rogers) exposing a router login, according to Shodan.
the /rest/api/user URL, while unrelated to CVE-2023-22518, had some interesting results:
Some of them appear to be attempts to notify administrators of unpatched Atlassian instances. These scans started on October 13th and are likely related to an earlier Atlassian vulnerability.