Incorrect Authorization Affecting atlassian-connect-express package, versions >=3.0.2 <6.6.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-ATLASSIANCONNECTEXPRESS-8720327
  • published13 Feb 2025
  • disclosed24 May 2022
  • creditUnknown

Introduced: 24 May 2022

CVE-2021-26073  (opens in a new tab)
CWE-287  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade atlassian-connect-express to version 6.6.0 or higher.

Overview

atlassian-connect-express is a Library for building Atlassian Add-ons on top of Express

Affected versions of this package are vulnerable to Incorrect Authorization due to improper validation of JWT types used during the authentication process. An attacker can bypass authentication restrictions by sending authenticated re-installation events using context JWTs instead of the required server-to-server JWTs.

CVSS Scores

version 4.0
version 3.1