Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Atlassian Scrambles to Fix Zero-day Security Hole Accidentally Disclosed on Twitter

Accepted submission by upstart at 2019-12-05 01:31:57
News

████ # This file was generated by upstart! Edit at your own risk. ████

Submitted via IRC for Bytram

Atlassian scrambles to fix zero-day security hole accidentally disclosed on Twitter [theregister.co.uk]

Twitter security celeb SwiftOnSecurity on Tuesday inadvertently disclosed a zero-day vulnerability [twitter.com] affecting enterprise software biz Atlassian, a flaw that may be echoed in IBM's Aspera software.

The SwiftOnSecurity Twitter account revealed that Atlassian provided a domain [atlassian.com] that resolved to a local server with a common SSL certificate for its Confluence cloud service, to enable the Atlassian Companion app to edit files in a preferred local application and save the files back to Confluence.

Confluence connects to its companion app through the browser using the rather unwieldy domain: " rel="url2html-24193">https://atlassian-domain-for-localhost-connections-only.com.

The problem with this arrangement is that anyone with sufficient technical knowledge could copy the SSL key and use it to conduct a man-in-the-middle attack that could allow an attacker to redirect app traffic to a malicious site.

Google security engineer Tavis Ormandy confirmed that anyone using the app could be subjected to such an attack.

As Ormandy explained [twitter.com], "you can just grab the private key, and nothing is stopping you resolving this domain to something other than localhost. Therefore, no guarantee that you're talking to a trusted local service and not an attacker."

SwiftOnSecurity reported the issue to Atlassian and obtained CVE-2019-15006 for the bug.

In an email to The Register, Atlassian said it's aware of the issue and is actively working to resolve it. "We have requested that the certificate be revoked, and we're evaluating whether other technical solutions are required to protect our customers," a company spokesperson said.

In the Twitter discussion, Tim Stone, a moderator for StackApps, observed [twitter.com] that IBM's Aspera plugin client uses a similar server scheme, local.connectme.us, for client-server communication.

According to Ormandy, that has the potential to be even worse. "There's a pre-generated CA certificate and a private key, if they add that to the system store, they're effectively disabling SSL," he wrote [twitter.com]. "I would consider that *critical*."

There's no indication at the moment that IBM does add that certificate to its system store, according to Stone.

Nonetheless, Ormandy contends [twitter.com] the certificate issue with local.connectme.us is real and argues the certificate should be revoked.

The Register asked IBM for comment but we've not heard back. ®

Sponsored: Technical Overview: Exasol Peek Under the Hood [theregister.co.uk]


Original Submission