Latest Atlassian vulnerabilities #

Atlassian issued a security bulletin for high and critical vulnerabilities found within third-party dependencies used within their products. The affected products include: Bamboo, Bitbucket, Confluence, Crowd, and JIRA.

Three of the critical vulnerabilities were found within the embedded Apache Tomcat web server. The first two: CVE-2024-50379CVE-2024-56337 with a CVSS score of 9.8, affects Confluence Data Center and Server as well as Crowd Data Center and Server with the potential for a remote attacker to execute arbitrary code. CVE-2024-52316, also with a CVSS score of 9.8, affects Crowd Data Center and Server, potentially allows for an authentication bypass by a remote attacker.

One high vulnerability found within the protocol buffer library CVE-2024-7254, with a CVSS score of 8.7, affects Bamboo Data Center and Server in addition to Jira Data Center and Server, potentially leading to a denial of service (DoS).

Another high vulnerability found with the Avro serialization library CVE-2024-47561, with a CVSS score of 7.3, affects Bitbucket Data Center and Server potentially allowing for a remote attacker to execute arbitrary code.

What is the impact? #

Bamboo, Crowd, and JIRA are vulnerable to denial of service vulnerabilities. Bitbucket, Confluence, and Crowd are vulnerable to unauthenticated remote execution of arbitrary code by a remote attacker. Crowd is also vulnerable to a broken authentication vulnerability.

Atlassian has indicated that there are no known active exploitations of the of the vulnerabilities. However, they recommend updating to the latest software revisions as soon as possible.

Are updates available? #

Updates are available and detailed within the security bulletin.

How do I find potentially vulnerable instances with runZero? #

From the Service Inventory, use the following query to locate systems running potentially vulnerable software:

(product:confluence OR (_asset.protocol:http AND protocol:http AND has:http.head.xConfluenceRequestTime)) OR (product:bamboo OR (_asset.protocol:http AND protocol:http AND _service.favicon.ico.image.mmh3:=-1379982221)) OR (product:bitbucket OR (_asset.protocol:http AND protocol:http AND _service.favicon.ico.image.mmh3:=667017222)) OR (product:crowd OR (_asset.protocol:http AND protocol:http AND _service.favicon.ico.image.mmh3:=-1231308448)) OR (product:jira OR (_asset.protocol:http AND protocol:http AND (_service.favicon.ico.image.mmh3:=628535358 OR _service.favicon.ico.image.mmh3:=855273746)))

Written by runZero Team

Due to the nature of their research and out of respect for their privacy, runZero team members prefer to remain anonymous. Their work is published under the runZero name.

More about runZero Team
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Explore more

Webcasts
The Unreasonable Effectiveness of Inside Out Attack Surface Management
HD Moore, founder of runZero (and previously Metasploit), presents new research that will forever redefine how you approach attack surface...
Webcasts
Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy
Security experts from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program join runZero to discuss...
runZero Insights
Ensure compliance with DORA’s ICT risk framework using runZero
Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.
Talks
DEF CON 32: SSHamble: Unexpected Exposures in SSH (Video)
This talk digs deep into SSH, the lesser-known implementations, many of the surprising security issues found along the way, and how to exploit them.

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2025 runZero, Inc. All Rights Reserved