-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2022.1284.4
      CVE-2016-10750 - Hazelcast vulnerable to remote code execution
                                8 June 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Atlassian Products
Publisher:         Atlassian
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-26133 CVE-2016-10750 

Original Bulletin: 
   https://confluence.atlassian.com/security/multiple-products-security-advisory-hazelcast-vulnerable-to-remote-code-execution-cve-2016-10750-1116292387.html

Comment: CVSS (Max):  8.1* CVE-2016-10750 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
         * Not all CVSS available when published

Revision History:  June   8 2022: Significant updates to Vendor advisory
                   April 11 2022: Vendor added CVE-2022-26133 affecting Bitbucket Data Center
                   March 25 2022: Updated Mail Subject
                   March 25 2022: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

+-------------------+---------------------------------------------------------+
|      Summary      |CVE-2016-10750 - Hazelcast vulnerable to remote code     |
|                   |execution                                                |
+-------------------+---------------------------------------------------------+
| Advisory Release  |24 Mar 2022 23:00 UTC (Coordinated Universal Time, +0    |
|       Date        |hours)                                                   |
+-------------------+---------------------------------------------------------+
|                   |  o Bitbucket Data Center                                |
| Affected Products |                                                         |
|                   |  o Confluence Data Center                               |
+-------------------+---------------------------------------------------------+
|      CVE ID       |CVE-2016-10750 (Confluence Data Center)                  |
|                   |CVE-2022-26133 (Bitbucket Data Center)                   |
+-------------------+---------------------------------------------------------+

This advisory has been updated since its initial publication.

06 Jun 2022 07:30 UTC (Coordinated Universal Time, +0 hours)

  o Updated the fixed version of the Confluence DC

08 Apr 2022 23:00 UTC (Coordinated Universal Time, +0 hours)

  o Assigned CVE-2022-26133 to the Bitbucket Data Center vulnerability, which
    was determined to be similar to CVE-2016-10750 yet slightly different and
    specific to Bitbucket
  o Note the new CVE assignment for Bitbucket does not change any other
    information in this advisory. The existing list of affected and fixed
    versions remains unchanged and accurate
  o Updated the Summary of Vulnerability section accordingly

28 Mar 2022 17:00 UTC (Coordinated Universal Time, +0 hours)

  o Added a "Severity" section which was accidentally omitted from the initial
    publication.

Summary of Vulnerability

Multiple Atlassian products use the third-party software Hazelcast, which is
vulnerable to Java deserialization attacks. Hazelcast is used by these products
when they're configured to run as a cluster. A remote, unauthenticated attacker
can exploit this vulnerability by sending a specially crafted request,
resulting in arbitrary code execution.

Severity

Atlassian rates the severity level of this vulnerability as critical, according
to the scale published in our Atlassian severity levels. The scale allows us to
rank the severity as critical, high, moderate or low.

This is our assessment and you should evaluate its applicability to your own IT
environment.

Affected Bitbucket Data Center Versions

  o Bitbucket Server is not affected.

  o Bitbucket Cloud is not affected.

Both single and multi-node installations of Bitbucket Data Center are affected.
Enabling or disabling clustering does not affect whether or not the application
is vulnerable.

The following versions of Bitbucket Data Center are affected:

  o All 5.x versions >= 5.14.x

  o All 6.x versions

  o All 7.x versions < 7.6.14

  o All versions 7.7.x through 7.16.x

  o 7.17.x < 7.17.6

  o 7.18.x < 7.18.4

  o 7.19.x < 7.19.4

  o 7.20.0

Fixed Bitbucket Data Center Versions

The following versions of Bitbucket Data Center fix this vulnerability:

  o 7.6.14

  o 7.17.6

  o 7.18.4

  o 7.19.4

  o 7.20.1

  o 7.21.0

Find the versions above on our downloads page and use the steps outlined in the
Bitbucket upgrade guide to complete the upgrade.

If you are unable to install a fixed version, refer to the "Workaround" section
below.

Affected Confluence Data Center Versions

  o Confluence Data Center instances that are not installed as a cluster are 
    not affected.

  o Confluence Server is not affected.

  o Confluence Cloud is not affected.

Confluence Data Center is only affected when it is installed as a cluster. To
verify whether a cluster installation is being used, check the
confluence.cfg.xml file in the Confluence home directory. If the following line
is present, it has been installed as a cluster:

<property name="confluence.cluster">true</property>

If the line is not present or if the value is set to false instead of true, it
has not been installed as a cluster.

The following versions of Confluence Data Center are affected when clustering
is enabled:

  o All versions 5.6.x and later

Fixed Confluence Data Center Versions

The following versions of Confluence Data Center fix this vulnerability:

  o 7.4.17

  o 7.13.7

  o 7.14.3

  o 7.15.2

  o 7.16.4

  o 7.17.4

  o 7.18.1

This issue can be tracked here:

CONFSERVER-79017 - Getting issue details... STATUS

Atlassian recommends that you upgrade to the latest Long Term Support release.
For a full description of the latest version, see the Confluence Server and
Data Center Release Notes. You can download the latest version from the
download centre.

Note: If you run Confluence in a cluster, you will not be able to upgrade to
these versions without downtime, also known as a rolling upgrade. Follow the
steps in Upgrading Confluence Data Center.

Workaround

Restrict access to the Hazelcast port by using a firewall or other network
access controls. The port only needs to be accessible by other nodes in the
Bitbucket or Confluence cluster.

For Bitbucket Data Center, Hazelcast uses TCP port 5701 by default.

For Confluence Data Center, Hazelcast uses both TCP ports 5701 and 5801 by
default.

Acknowledgements

We would like to acknowledge Benny Jacob (SnowyOwl) for reporting this
vulnerability to Atlassian's bug bounty program.

References

  o BSERV-13173 - Getting issue details... STATUS
  o CONFSERVER-78179 - Getting issue details... STATUS

Last modified on Jun 6, 2022

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=S8QF
-----END PGP SIGNATURE-----