Exposed JIRA service desks grant access to organizations’ internal operations

Summary

Internal ticketing tool Atlassian JIRA's unsecured service desks were publicly exposed, allowing attackers to raise internal tickets for multiple departments.
In an attempt to fight the spread of Coronavirus, Governments are carrying out social distancing measures with the cooperation of its citizens, local agencies, and businesses. With remote work becoming the new normal, companies are setting up tools and processes to facilitate to ensure their business is not affected by the crisis. This has led to the unprecedented adoption and usage of Project management and internal ticketing tools such as Atlassian JIRA and Asana. However, it was recently found that several of Atlassian JIRA’s internal service desks were found publicly exposed and attackers were able to retool them to act as internal service ticket portals. The following Google dork compiles the list of open JIRA service desks: site:atlassian.net AND “Enter your e-mail address and we will send you a private sign up link”
List of open JIRA service desks on Google
List of open JIRA service desks on Google
This allows attackers to sign up as employees and raise legitimate internal requests.
JIRA sign up page that only requires user email id
JIRA sign up page that only requires user email id
Since all internal requests are not authenticated, attackers take advantage of the situation to set up projects for multiple departments such as IT, Finance, Legal, HR, etc. This provides the attackers a leeway to access to users’ email addresses, employee information, customer details, social media channels and internal tools. It also allows them to make changes to online assets, request salary changes, and even request for access badges to the company’s office premises. So, if you are working remotely, ensure all your project management, ticketing, and collaboration tools are secure.

Table of Contents

Request an easy and customized demo for free