Atlassian uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. Accept all cookies to indicate that you agree to our use of cookies on your device. Atlassian cookies and tracking notice, (opens new window)
Confluence
Teams
, (opens new window)

Legal
Results will update as you type.
  • Support times - SLA Statement
  • License
    • Privacy Policy
    • Security Policy
      • Security audit - Cloud (03/03/2025)
      • Security audit - Cloud (19/12/2023)
      • Security audit - Cloud (14/07/2022)
      • CAIQ Lite – Requirement Yogi Cloud
    • Terms of Use
    • EULA
    • Source Code Agreement
    • Security Overview
  • Requirement Yogi Legal Information
    Calendars
You‘re viewing this with anonymous access, so some content might be blocked.
/
Security audit - Cloud (03/03/2025)
Updated Mar 04

    Security audit - Cloud (03/03/2025)

    Report from Néosoft on March 3rd, 2025

    The text below is a summary of the security audit performed by Néosoft. See the full report.

    Introduction

    This document reports the security audit results of the Confluence and Jira plugins “Requirement Yogi Cloud”, “Requirement Yogi for Jira Cloud”, Requirement Yogi Standalone application and the Keycloak authentication platform developed by the company Requirement Yogi.

    Néosoft did the audit between for a week in January 2025.

    Requirement Yogi provided three accounts: Super Admin, Admin and User.

    N.B: the results come from 4 days of audit. Thus, they may be only a subset of what an attacker with no time limit can find.

    Risk analysis summary

    The main risks which the auditor was asked to focus on were:

    • Data injection,

    • Security Misconfiguration.

    During the audit, the auditor has determined a unique scenario that could impact the company Requirement Yogi:

    • The cookies used by the main application do not have a configured "SameSite" security attribute.
      The "SameSite" attribute helps mitigate the risks associated with Cross-Site Request Forgery (CSRF) attacks. In this case, the absence of this protection makes the application more vulnerable to potential CSRF attacks.
      Likelihood : 1 (Low)
      Potential impact : 1 (Low)
      Note : This point cannot be corrected because the OAuth authentication (Keycloak) uses the cookie for authentication across all our websites (c.f. explaination by the Keycloak team ). As this issue is associated with a very low criticality, it was decided to rate it as a false-positive.

    Risk assessment grades

    image-20240201-092344.png

    General overview

    Strength

    ✓ Very limited potential attack surface

    ✓ No injections identified (XSS, SQLi, SSTI, ...)

    ✓ No access control issues found

    ✓ JWT session tokens well signed / secured

    ✓ No file upload vulnerabilities found

    ✓ Security good practices generally taken into account

    ✓ Quick implementation of the identified improvements

    Possible improvements

    ❖ Excel formula injection in exportable data

    ❖ Access to Swagger documentation without authentication

    Conclusion

    During the audit, no critical or high vulnerabilities were found by the auditor.

    By focusing on the security picture only, the plugin Requirement Yogi Cloud is at a good level.

    An attacker will certainly take a considerable amount of time to find and exploit a potential vulnerability in the API. Thus, an attacker would try gaining access to the system by other meanings, like stealing the AWS credentials, doing a phishing attack on employees or other.

    The global security score assigned to the service is A, meaning that no critical vulnerability has been identified.

    For one application, the application's cookies, including session cookies, lack the SameSite security attribute, increasing the risk of Cross-Site Request Forgery (CSRF) attacks that could exploit unauthorized requests. But it was decided to rate it as false-positive (see paragraph above).

    Positive aspects were also identified, such as the absence of injection possibilities like XSS or SQLi and the absence of reported file upload vulnerabilities. In addition, the service generally adheres to security best practices, including correct input validation, secure coding standards and regular updates.

     

    Grade : A

    No significant vulnerability or very uncritical vulnerabilities



    SAS au capital de 832.000€ - 41-45 Bd Romain Rolland – 75014 PARIS

    Tél : +33 (0)1 41 10 41 60 - e-mail: mailto:contact.site@neo-soft.fr – http://www.neosoft.fr
    RCS PARIS 484 348 487
    N° TVA : FR23484348487





    {"serverDuration": 11, "requestCorrelationId": "a791e89cfad149ea9fa98b0b45e8fa73"}