About Us

The Oil & Gas Journal, first published in 1902, is the world's most widely read petroleum industry publication. OGJ delivers international oil and gas industry news; analysis of issues and events; practical technology for design, operation, and maintenance of oil and gas operations; and important statistics on energy markets and industry activity.

OGJ is edited to meet the needs of engineers, geoscientists, managers, and executives throughout the oil and gas industry. It is part of Endeavor Business Media, Nashville, Tenn., which also publishes Offshore Magazine.

Endeavor Business Media’s Petroleum Group also produces targeted e-Newsletters; hosts global conferences and exhibitions, seminars, and forums; and publishes directories, technical books, print and electronic databases, surveys, and maps.

Additional Information

Website & Technical Help

For help with subscription purchases or refunds, or trouble logging into the paid subscription content on www.ogj.com, please contact Customer Service at [email protected] or call 1-847-559-7598.

For more customer service information, please click here.

Leading Productivity Software Provider Patches Critical Security Issues in Two of Its Products

By: IssueWire

The high-severity vulnerabilities found in Confluence and Bamboo product lines could allow authenticated attackers to manipulate system calls and execute arbitrary code, potentially leading to severe impacts

Surrey, United Kingdom Aug 21, 2023 (Issuewire.com) - Geeky News, a technology and lifestyle platform, recently published an article that highlights critical security patches released by a productivity software provider for two of its products. Atlassian, a leading provider of team collaboration and productivity software, has released critical patches to address remote code execution (RCE) vulnerabilities in its Confluence and Bamboo products. In cases of successful exploitation, these vulnerabilities could allow authenticated attackers to manipulate system calls and execute arbitrary code, potentially leading to severe impacts on system integrity, confidentiality, and availability, reported The Hacker News

According to the report, these vulnerabilities have been identified through the company's bug bounty program, penetration testing procedures, and evaluations of third-party library scans. The most severe RCE vulnerability tracked down as CVE-2023-22508 with a CVSS score of 8.5 was detected in Confluence Data Center & Server version 7.4.0. Vulnerable versions span from 7.19.8 up to, but not including, 8.2.0. Versions 8.2.0 and beyond are immune to this specific exploit. 

A second high-severity RCE issue detected as CVE-2023-22505 with a CVSS score of 8.0, was found in Data Center & Server version 8.0.0. Affected versions range from 8.0.0 up to, excepting 8.3.2 and 8.4.0. Versions 8.3.2 onwards and 8.4.0 and the following editions were not impacted.

Another flaw infecting Bamboo Data Center and Server is CVE-2023-22506. It's a combination of an injection flaw with an RCE that can make the system security highly vulnerable. Tracked in version 8.0.0 of Bamboo Data Center, this flaw, with a CVSS score of 7.5, permits authenticated hackers to manipulate system call actions. Ultimately, it allows them to pose substantial risks to system uptime, privacy, and integrity. According to the report, the impacted versions range from 8.0.0 up to, but not incorporating, versions 9.2.3 and 9.3.1. Versions 9.2.3, 9.3.1, and subsequent releases are unaffected.

These high-severity vulnerabilities could be exploited by hackers without requiring any user interaction. The exploitation of these vulnerabilities could lead to unauthorised control of the compromised server, resulting in malware injection, data theft, and even massive operational disruptions. 

In response to these critical security issues, Atlassian has promptly released patches for the vulnerabilities across its Confluence and Bamboo product lines. Users are strongly urged to update their software to the latest versions, or at least the swiftly released Confluence versions 8.3.2 and 8.4.0. Atlassian stack customers unable to upgrade to the recommended editions are advised to update at least to version 8.2.0, which addresses CVE-2023-22508. Atlassian also promptly released versions 9.2.3 and 9.3.1 of Bamboo Data Center, which can effectively address the CVE-2023-22506 issue. The report says that users need to quickly install the patches because these attacks can be executed without any user interaction.

Atlassian tools are aimed at enabling teams to power collaboration, thus improving their productivity. However, companies looking to completely leverage the benefits of the Atlassian stack might want to invest in a high-end managed service provider (MSP) like Automation Consultants. By collaborating with expert MSPs, teams can keep their Atlassian stack performing at their best while reducing the risk of operational disruptions and unplanned downtime. 

The recently patched RCE flaws in Confluence and Bamboo products emphasise Atlassian's commitment to protecting customer security. The report highlights the company's statement: "While this change results in an increase of visibility and disclosures, it does not mean there are more vulnerabilities. Rather, we are taking a more proactive approach to vulnerability transparency and are committed to providing our customers with the information they need to make informed decisions about updating our products."

 

Media Contact

Geeky News


press@geekynews.co.uk

+44 20 3800 1212

Parallel House, 32 London Road Guildford, Surrey

https://www.geekynews.co.uk/

Source :Geeky News

This article was originally published by IssueWire. Read the original article here.

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.