The text below is a summary of the security audit performed by Néosoft. You can also download the full report.

Report from Néosoft on March 3rd, 2025

The text below is a summary of the security audit performed by Néosoft. See the full report.

Introduction

This document reports the security audit results of the Confluence and Jira plugins “Requirement Yogi Cloud”, “Requirement Yogi for Jira Cloud”, Requirement Yogi Standalone application and the Keycloak authentication platform developed by the company Requirement Yogi.

Néosoft did the audit between for a week in January 2025.

Requirement Yogi provided three accounts: Super Admin, Admin and User.

N.B: the results come from 4 days of audit. Thus, they may be only a subset of what an attacker with no time limit can find.

Risk analysis summary

The main risks which the auditor was asked to focus on were:

During the audit, the auditor has determined a unique scenario that could impact the company Requirement Yogi:

Risk assessment grades

image-20240201-092344.png

General overview

Strength

✓ Very limited potential attack surface

✓ No injections identified (XSS, SQLi, SSTI, ...)

✓ No access control issues found

✓ JWT session tokens well signed / secured

✓ No file upload vulnerabilities found

✓ Security good practices generally taken into account

✓ Quick implementation of the identified improvements

Possible improvements

❖ Excel formula injection in exportable data

❖ Access to Swagger documentation without authentication

Conclusion

During the audit, no critical or high vulnerabilities were found by the auditor.

By focusing on the security picture only, the plugin Requirement Yogi Cloud is at a good level.

An attacker will certainly take a considerable amount of time to find and exploit a potential vulnerability in the API. Thus, an attacker would try gaining access to the system by other meanings, like stealing the AWS credentials, doing a phishing attack on employees or other.

The global security score assigned to the service is A, meaning that no critical vulnerability has been identified.

For one application, the application's cookies, including session cookies, lack the SameSite security attribute, increasing the risk of Cross-Site Request Forgery (CSRF) attacks that could exploit unauthorized requests. But it was decided to rate it as false-positive (see paragraph above).

Positive aspects were also identified, such as the absence of injection possibilities like XSS or SQLi and the absence of reported file upload vulnerabilities. In addition, the service generally adheres to security best practices, including correct input validation, secure coding standards and regular updates.

Grade : A

No significant vulnerability or very uncritical vulnerabilities


SAS au capital de 832.000€ - 41-45 Bd Romain Rolland – 75014 PARIS

Tél : +33 (0)1 41 10 41 60 - e-mail: mailto:contact.site@neo-soft.frhttp://www.neosoft.fr
RCS PARIS 484 348 487
N° TVA : FR23484348487