{"id":34353,"date":"2024-03-11T20:47:23","date_gmt":"2024-03-11T20:47:23","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=34353"},"modified":"2024-03-11T20:47:25","modified_gmt":"2024-03-11T20:47:25","slug":"vulnerability-recap-march-11-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/","title":{"rendered":"VulnRecap 3\/11\/24 \u2013 JetBrains &amp; Atlassian Issues Persist"},"content":{"rendered":"\n<p>This past week, both JetBrains TeamCity and Atlassian Confluence products have run into more hiccups as their string of vulnerabilities continues. Apple&#8217;s also had plenty to patch, and Cisco, OpenEdge, and VMware appeared in the news, too. JetBrains and Atlassian users should pay special attention since vulnerabilities continue cropping up in the same products. And all IT and security teams should follow vulnerability news for vendor bulletins and updates.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 4, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">JetBrains Server Issues Continue with New Vulnerabilities<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Two authentication bypass vulnerabilities, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-27198\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-27198<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-27199\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-27199<\/a>, allow unauthenticated attackers to exploit JetBrains TeamCity servers. The more severe CVE-2024-27198 allows a threat actor to take over the entire server. Researchers at Rapid7 discovered these vulnerabilities in late February and released information regarding them on March 4.<\/p>\n\n\n\n<p>These are different JetBrains vulnerabilities than the ones mentioned in past recaps. We&#8217;ve seen multiple over the last couple of months, but these are new and not to be confused with CVEs from 2023. Potential exploits of the new vulnerabilities can include remote code execution on TeamCity servers.<\/p>\n\n\n\n<p>JetBrains released a <a href=\"https:\/\/blog.jetbrains.com\/teamcity\/2024\/03\/our-approach-addressing-recently-discovered-vulnerabilities-in-teamcity-on-premises\/\" target=\"_blank\" rel=\"noreferrer noopener\">detailed blog post<\/a> explaining the specific timeline of discovering the vulnerabilities, the conflict with Rapid7, and JetBrains&#8217; stance on releasing vulnerability information. Its position is that immediately releasing vulnerability data to the public allows threat actors to exploit the issues before customers have sufficient time to patch them.<\/p>\n\n\n\n<p>However, <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2022\/06\/06\/the-hidden-harm-of-silent-patches\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rapid7&#8217;s policy<\/a> holds that silent patching limits the ways experienced IT pros can participate in protecting networks and information systems. Because of these differences, JetBrains decided not to coordinate with Rapid7 in disclosing the vulnerability information.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Deploy JetBrains TeamCity version 2023.11.4 to all servers that can support it. This release includes installation files and updated Docker images. According to JetBrains&#8217; blog post, the new version and the related security patch plug-in solves both authentication bypass vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 5, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">New Apple Vulnerabilities Necessitate Rapid Patching<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Multiple issues, including kernel security bypass vulnerabilities.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> On March 5, Apple released a <a href=\"https:\/\/support.apple.com\/en-us\/HT214081\" target=\"_blank\" rel=\"noreferrer noopener\">security notice<\/a> for its new operating systems, iOS 17.4 and iPadOS 17.4. These new OS versions fixed multiple CVEs. Two of the more severe vulnerabilities are CVE-2024-23225, found in Kernel, and CVE-2024-23296, found in RealtimeKit (RTKit). Both vulnerabilities allow an attacker to bypass standard kernel memory protections when the attacker has arbitrary read and write capabilities within the kernel.<\/p>\n\n\n\n<p>Other CVEs fixed in the new update included CVE-2024-23243, which allowed an application to potentially view sensitive location data, and CVE-2024-23262, which allowed an application to potentially spoof system notifications and the user interface.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Deploy iOS 17.4 and iPadOS 17.4 to all devices that will support them as soon as possible. These releases fix over 30 vulnerabilities.<\/p>\n\n\n\n<p><strong>If your business doesn&#8217;t have a good method of quickly finding vulnerabilities, consider investing in a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/website-vulnerability-scanners\/\">vulnerability scanning product<\/a> specifically designed for websites, applications, or DevOps use cases.&nbsp;<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">VMware Vulnerability Affects ESXi, Workstation &amp; Fusion<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Use-after-free vulnerability potentially leading to code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> CVE-2024-22252, a use-after-free vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-22252\" target=\"_blank\" rel=\"noreferrer noopener\">could allow a threat actor<\/a> to execute code using admin privileges on a VMware virtual machine. <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2024-0006.html\" target=\"_blank\" rel=\"noreferrer noopener\">This issue<\/a> affects VMware ESXi, Workstation, and Fusion. According to the National Instutite of Standards and Technology, the exploitation is contained within the VMX sandbox in ESXi, but in Workstation and Fusion, the vulnerability could lead to code execution on machines where the products are installed.<\/p>\n\n\n\n<p>Specific products affected include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>VMware ESXi<\/li>\n\n\n\n<li>VMware Workstation Pro \/ Player (Workstation)<\/li>\n\n\n\n<li>VMware Fusion Pro \/ Fusion (Fusion)<\/li>\n\n\n\n<li>VMware Cloud Foundation (Cloud Foundation)<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> VMware created the following table for users so they know which fixed versions to apply:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_a.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"512\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_a.jpg\" alt=\"Chart of version fixes from VMware.\" class=\"wp-image-34356\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_a.jpg 1200w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_a-300x128.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_a-1024x437.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_a-768x328.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 6, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Cisco Offers Fixed Releases for Secure Client Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Carriage return line feed (CRLF) injection attack by an unauthenticated remote attacker.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Cisco&#8217;s Secure Client software has a vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-20337\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-20337<\/a>, that allows an attacker to complete a carriage return line feed injection attack. <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-secure-client-crlf-W43V4G7\" target=\"_blank\" rel=\"noreferrer noopener\">According to Cisco<\/a>, after exploiting the Secure Client vulnerability, an attacker could execute arbitrary code or access sensitive data in the browser, like valid SAML tokens. Whichever user&#8217;s privileges the attacker has exploited could then be used to create a remote access VPN session.<\/p>\n\n\n\n<p>Insufficient validation of user-supplied input causes this vulnerability, according to Cisco. It affects the following products:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure Client for Linux<\/li>\n\n\n\n<li>Secure Client for macOS<\/li>\n\n\n\n<li>Secure Client for Windows<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> Cisco provides the following information on fixed software releases:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_b.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"208\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_b.jpg\" alt=\"Table containing info on software fix releases from Cisco.\" class=\"wp-image-34355\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_b.jpg 1200w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_b-300x52.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_b-1024x177.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240311-vulnerability-recap-march-11-2024-figure_b-768x133.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Proof of Concept Released for OpenEdge Vulnerabilities<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Potential authentication bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Progress Software&#8217;s OpenEdge Authentication Gateway and AdminServer have a vulnerability in the following versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>OpenEdge Release 11.7.18 and earlier<\/li>\n\n\n\n<li>OpenEdge 12.2.13 and earlier<\/li>\n\n\n\n<li>OpenEdge 12.8.0<\/li>\n<\/ul>\n\n\n\n<p>According to Progress, when OpenEdge Authentication Gateway &#8220;is configured with an OpenEdge Domain that uses the OS local authentication provider to grant user-id and password logins on operating platforms supported by active releases of OpenEdge, a vulnerability in the authentication routines may lead to unauthorized access on attempted logins.&#8221;<\/p>\n\n\n\n<p>The same unauthorized login access can occur when OpenEdge Explorer (OEE) and OpenEdge Management (OEM) connect to AdminServer. The vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-1403\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-1403<\/a>, has a critical severity rating.<\/p>\n\n\n\n<p><a href=\"https:\/\/community.progress.com\/s\/article\/Important-Critical-Alert-for-OpenEdge-Authentication-Gateway-and-AdminServer\" target=\"_blank\" rel=\"noreferrer noopener\">Progress also notes<\/a> that AdminServer logins are always vulnerable because they only support OS local logins. OpenEdge Authentication Gateway is only vulnerable to authentication bypass when admins configure OpenEdge domains to use the operating system&#8217;s local authentication provider.<\/p>\n\n\n\n<p>Progress released the notice in late February; on March 6, <a href=\"https:\/\/github.com\/horizon3ai\/CVE-2024-1403?tab=readme-ov-file\" target=\"_blank\" rel=\"noreferrer noopener\">Horizon3AI released<\/a> a proof of concept for an OpenEdge exploit. The proof of concept is available on GitHub for interested users, as well as a <a href=\"https:\/\/www.horizon3.ai\/attack-research\/cve-2024-1403-progress-openedge-authentication-bypass-deep-dive\/\" target=\"_blank\" rel=\"noreferrer noopener\">longer blog post<\/a> that provides detailed code information and walks pros through Horizon3AI&#8217;s process.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Progress Software has released the following versions of OpenEdge LTS, in which the vulnerability is fixed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>11.7.19<\/li>\n\n\n\n<li>12.2.14<\/li>\n\n\n\n<li>12.8.1<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 8, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Exploits of Confluence Vulnerabilities Continue<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/confluence.atlassian.com\/security\/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-22527<\/a>, a remote code execution vulnerability in outdated versions of Atlassian Confluence Data Center and Confluence Server, is currently being actively exploited. Atlassian disclosed the vulnerability in January, but threat actors continue to capitalize on the issue: VulnCheck recently published a <a href=\"https:\/\/vulncheck.com\/blog\/confluence-dreams-of-shells\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> and noted that the vulnerability has at least 30 unique exploits, as of March 8.<\/p>\n\n\n\n<p>VulnCheck also observed that multiple instances of exploitation use freemarker.template.utility.Execute, which will easily be picked up by endpoint detection and response platforms.<\/p>\n\n\n\n<p>The vulnerability affects the following Confluence Data Center and Server versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>8.0.x<\/li>\n\n\n\n<li>8.1.x<\/li>\n\n\n\n<li>8.2.x<\/li>\n\n\n\n<li>8.3.x<\/li>\n\n\n\n<li>8.4.x<\/li>\n\n\n\n<li>8.5.0-8.5.3<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> Atlassian recommends updating your instance of Confluence Data Center or Confluence Server to one of the most recent versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Confluence Data Center and Server:\n<ul class=\"wp-block-list\">\n<li>8.5.4 (LTS)<\/li>\n\n\n\n<li>8.5.5 (LTS)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Confluence Data Center only:\n<ul class=\"wp-block-list\">\n<li>8.6.0 (Data Center Only)<\/li>\n\n\n\n<li>8.7.1 (Data Center Only)<\/li>\n\n\n\n<li>8.7.2 (Data Center Only)&nbsp;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-4-2024\/\"><strong>VulnRecap 3\/4\/24 \u2013 Ivanti, Ubiquiti, AppLocker Under Attack<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>6 Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6f38b62c21-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f38b62c21\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f38b62c21\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f38b62c21\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f38b62c21\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f38b62c21\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f38b62c21\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Read about the past week&#8217;s vulnerabilities, including Atlassian and JetBrains issues and recent Apple updates.<\/p>\n","protected":false},"author":238,"featured_media":34360,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[32039],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-34353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-vulnerability-news","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly Vulnerability Recap 3\/11\/24: JetBrains &amp; Atlassian Issues<\/title>\n<meta name=\"description\" content=\"Read about the past week&#039;s vulnerabilities, including Atlassian and JetBrains issues and recent Apple updates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Vulnerability Recap 3\/11\/24: JetBrains &amp; Atlassian Issues\" \/>\n<meta property=\"og:description\" content=\"Read about the past week&#039;s vulnerabilities, including Atlassian and JetBrains issues and recent Apple updates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T20:47:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-11T20:47:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"744\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"VulnRecap 3\/11\/24 \u2013 JetBrains &amp; Atlassian Issues Persist\",\"datePublished\":\"2024-03-11T20:47:23+00:00\",\"dateModified\":\"2024-03-11T20:47:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\"},\"wordCount\":1155,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg\",\"keywords\":[\"vulnerability news\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\",\"name\":\"Weekly Vulnerability Recap 3\/11\/24: JetBrains & Atlassian Issues\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg\",\"datePublished\":\"2024-03-11T20:47:23+00:00\",\"dateModified\":\"2024-03-11T20:47:25+00:00\",\"description\":\"Read about the past week's vulnerabilities, including Atlassian and JetBrains issues and recent Apple updates.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg\",\"width\":1200,\"height\":744,\"caption\":\"Vulnerability recap.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VulnRecap 3\/11\/24 \u2013 JetBrains &amp; Atlassian Issues Persist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Vulnerability Recap 3\/11\/24: JetBrains & Atlassian Issues","description":"Read about the past week's vulnerabilities, including Atlassian and JetBrains issues and recent Apple updates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Vulnerability Recap 3\/11\/24: JetBrains & Atlassian Issues","og_description":"Read about the past week's vulnerabilities, including Atlassian and JetBrains issues and recent Apple updates.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-03-11T20:47:23+00:00","article_modified_time":"2024-03-11T20:47:25+00:00","og_image":[{"width":1200,"height":744,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg","type":"image\/jpeg"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"VulnRecap 3\/11\/24 \u2013 JetBrains &amp; Atlassian Issues Persist","datePublished":"2024-03-11T20:47:23+00:00","dateModified":"2024-03-11T20:47:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/"},"wordCount":1155,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg","keywords":["vulnerability news"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/","name":"Weekly Vulnerability Recap 3\/11\/24: JetBrains & Atlassian Issues","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg","datePublished":"2024-03-11T20:47:23+00:00","dateModified":"2024-03-11T20:47:25+00:00","description":"Read about the past week's vulnerabilities, including Atlassian and JetBrains issues and recent Apple updates.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/Vulnerability-news.jpeg","width":1200,"height":744,"caption":"Vulnerability recap."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"VulnRecap 3\/11\/24 \u2013 JetBrains &amp; Atlassian Issues Persist"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34353"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=34353"}],"version-history":[{"count":4,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34353\/revisions"}],"predecessor-version":[{"id":34362,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34353\/revisions\/34362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/34360"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=34353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=34353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=34353"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=34353"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=34353"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=34353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}