Atlassian uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. Accept all cookies to indicate that you agree to our use of cookies on your device. Atlassian cookies and tracking notice, (opens new window)
Confluence
/
Security audit - Cloud (19/12/2023)
Published Feb 01, 2024

    Security audit - Cloud (19/12/2023)

    Report from Néosoft on December 19th, 2023

    The text below is a summary of the security audit performed by Néosoft. See the full report.

    Introduction

    This document reports the security audit results of the Confluence and Jira plugins “Requirement Yogi Cloud” and “Requirement Yogi for Jira Cloud” developed by the company Requirement Yogi.

    Néosoft did the audit between for a week in December 2023.

    Requirement Yogi provided three accounts: Super Admin, Admin and User.

    N.B: the results come from 4 days of audit. Thus, they may be only a subset of what an attacker with no time limit can find.

    Risk analysis summary

    The main risks which the auditor was asked to focus on were:

    • Data injection,

    • Security Misconfiguration.

    During the audit, the auditor has determined two scenarios that could impact the company Requirement Yogi:

    • It is possible to export data in Excel format. However, malicious users (including those with "user" profile) could deliberately enter malicious Excel formulas in these data in order to execute arbitrary code on the workstations of people downloading them. A security warning will probably be displayed when Excel is opened, but most users ignore these warnings.

    • The Swagger of the plugin is accessible without authentication at the Swagger URL.

    Risk assessment grades

    image-20240201-092344.png



    Summary

    Scenario

    Likelihood

    Impact

    Criticality

    Action to lower the risk

    Scenario

    Likelihood

    Impact

    Criticality

    Action to lower the risk

    Excel formula injection

    2

    2

    2

    Filter Excel formulas in exported files

    Access to the swagger file

    1

    1

    1

    Advised : Filter access to the Swagger
    Planned : The Swagger file will be accessible to all our client to allow them using our APIs.

    General overview

    Strength

    ✓ Very limited potential attack surface

    ✓ Very few audit findings

    ✓ Non-critical audit findings

    ✓ Very quick fixes proposed

    ✓ JWT session tokens well signed / secured

    ✓ Security good practices generally taken into account

    Possible improvements

    ❖ Excel formula injection in exportable data

    ❖ Access to Swagger documentation without authentication

    Conclusion

    During the audit, no critical or high vulnerabilities were found by the auditor.

    By focusing on the security picture only, the plugin Requirement Yogi Cloud is at a good level.

    An attacker will certainly take a considerable amount of time to find and exploit a potential vulnerability in the API. Thus, an attacker would try gaining access to the system by other meanings, like stealing the AWS credentials, doing a phishing attack on employees or other.

    The global security score assigned to the service is A, meaning that no critical vulnerability has been identified.

    Two audit findings have been reported, one of which is more a recommendation for improvement than a real vulnerability.

    Malicious users could deliberately enter malicious Excel formulas in exportable data to execute arbitrary code on the workstations of people downloading them. A security warning will probably be displayed when Excel is opened, but most users ignore these warnings.

    The main risk would therefore be to use the application as an attack vector to compromise other users' workstations, to steal the data stored on them, or possibly to increase one's privileges on the application.

     

    Grade : A

    No significant vulnerability or very uncritical vulnerabilities



    SAS au capital de 832.000€ - 41-45 Bd Romain Rolland – 75014 PARIS

    Tél : +33 (0)1 41 10 41 60 - e-mail: mailto:contact.site@neo-soft.fr – http://www.neosoft.fr
    RCS PARIS 484 348 487
    N° TVA : FR23484348487





    Teams
    , (opens new window)

    Legal
    Results will update as you type.
    • Support times - SLA Statement
    • License
      • Privacy Policy
      • Security Policy
        • Security audit - Cloud (03/03/2025)
        • Security audit - Cloud (19/12/2023)
        • Security audit - Cloud (14/07/2022)
        • CAIQ Lite – Requirement Yogi Cloud
      • Terms of Use
      • EULA
      • Source Code Agreement
      • Security Overview
    • Requirement Yogi Legal Information
      Calendars
    You‘re viewing this with anonymous access, so some content might be blocked.
    {"serverDuration": 9, "requestCorrelationId": "cbfc0f2a8fca4515ae2035d4c0c028ac"}