{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T19:01:07.853","vulnerabilities":[{"cve":{"id":"CVE-2021-26077","sourceIdentifier":"security@atlassian.com","published":"2021-05-10T00:15:07.543","lastModified":"2025-02-12T21:15:10.730","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app."},{"lang":"es","value":"Autenticación rota en Atlassian Connect Spring Boot (ACSB) en la versión 1.1.0 antes de la versión 2.1.3 y a partir de la versión 2.1.4 antes de la versión 2.1.5: Atlassian Connect Spring Boot es un paquete Java Spring Boot para crear aplicaciones de Atlassian Connect. La autenticación entre los productos de Atlassian y la aplicación Atlassian Connect Spring Boot se produce con un JWT de servidor a servidor o un JWT de contexto. Las versiones de Atlassian Connect Spring Boot 1.1.0 antes de la versión 2.1.3 y las versiones 2.1.4 antes de la versión 2.1.5 aceptan erróneamente JWTs de contexto en los puntos finales del ciclo de vida (como la instalación) cuando sólo deberían aceptarse JWTs de servidor a servidor, lo que permite a un atacante enviar eventos de reinstalación autenticados a una aplicación"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":5.3}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:connect_spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1.0","versionEndExcluding":"2.1.3","matchCriteriaId":"2AA2CBC2-F9F4-4F3C-8446-D995F1D8AE2E"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:connect_spring_boot:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.4","versionEndExcluding":"2.1.5","matchCriteriaId":"66CA153C-C748-4587-BFAE-5DD259FAA94B"}]}]}],"references":[{"url":"https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072","source":"security@atlassian.com","tags":["Exploit","Issue Tracking","Vendor Advisory"]},{"url":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147","source":"security@atlassian.com","tags":["Vendor Advisory"]},{"url":"https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Vendor Advisory"]},{"url":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}