Atlassian patches One-Click flaw that allowed hackers to steal user sessions

Image: Shutterstock via Dennis

With the stolen session, the hacker could steal sensitive information



Read More:

25 June 2021 | 0

Security researchers have warned of a critical flaw in the Atlassian project and software development platform that hackers can use to take over an account and control some of the apps connected through its single sign-on (SSO) capability.

According to Check Point Research (CPR), hackers could exploit the flaw to access Atlassian’s Jira, a bug-tracking and agile project-management tool used by over 65,000 customers, including Cisco, Pfizer, and Visa.

The flaw focuses on Atlassian’s use of SSO to ensure continuous navigation between subdomains for related products, such as Jira ( and Confluence ( This creates a potential attack scenario involving injecting malicious code into the platform, then leveraging a session fixation flaw to hijack a valid user session and take control of an account.




Researchers proved that account takeover was possible on Atlassian accounts accessible by subdomains under

To exploit the flaw, hackers would have to lure a victim into clicking on a crafted link coming from the “Atlassian” domain via social media, a fake e-mail, or a messaging app, etc. By clicking on the link, the payload would send a request on the victim’s behalf to the Atlassian platform, which would perform the attack and steal the user session. Then the hacker logs onto the victim’s Atlassian apps associated with the account, gaining all the sensitive information stored there.

“What makes a supply chain attack such as this one so significant is the fact that once the attacker leverages these vulnerabilities and takes over an account, he can plant backdoors that he can use in the future for his attack. This can create severe damage which will be identified and controlled only much after the damage is done,” said researchers.

Lewis Jones, threat intelligence analyst at Talion, told ITPro that successfully exploiting these flaws could result in a supply-chain attack whereby an attacker can take over an account, use it to perform unauthorized actions, such as edit Confluence pages, access Jira tickets, and even inject malicious implants to stage further attacks down the line.

“Furthermore, if an attacker gains access to a Jira account, the attacker can proceed to gain control of a Bitbucket account which could lead to an attacker being able to pilfer credentials. This could grant them permissions to access or alter source code, make the repository public, or even insert backdoors,” he said.

“Whilst details have recently emerged, a fix for the flaw was released in May. Users are advised to ensure that updates are implemented as soon as possible, and to continue monitoring for any further developments.”

CPR disclosed its research findings to Atlassian on 8 January, and Atlassian deployed a fix on 18 May.

© Dennis Publishing

Professional Development for IT professionals

The mission of the Irish Computer Society is to advance, promote and represent the interests of ICT professionals in Ireland. Membership of the ICS typically reduces courses by 20%. Find out more

Read More:

Comments are closed.

Back to Top ↑