{"id":4728,"date":"2024-01-08T15:54:49","date_gmt":"2024-01-08T15:54:49","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=4728"},"modified":"2024-08-08T12:19:04","modified_gmt":"2024-08-08T12:19:04","slug":"atlassian-security-incidents-2023-in-review","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/","title":{"rendered":"Atlassian security incidents: 2023 in Review"},"content":{"rendered":"\n<p>Welcome back to our second article in the series of DevOps-related incidents and failures. If you missed our previous review, don\u2019t hesitate and catch up with it: <a href=\"https:\/\/gitprotect.io\/blog\/2023-in-review-infamous-github-related-incidents-and-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">Infamous GitHub-related incidents and threats: 2023 in Review<\/a>.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>This time our focus moves to Atlassian-related incidents and \u201cfackups\u201d. As you may remember the <a href=\"https:\/\/gitprotect.io\/blog\/2022-in-a-nutshell-atlassian-outages-and-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">year 2022 was rather rich for outages, security flaws, and vulnerabilities detected in Jira and Bitbucket<\/a>. However, what about 2023? Was it the same hard?<\/p>\n\n\n\n<p>Well, we don\u2019t want you to wait any longer, so let\u2019s get absorbed into the topic\u2026<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>DECEMBER 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>3 incidents<\/td><td>6 incidents<\/td><td>4 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Atlassian addresses four critical flaws in its software to prevent remote code execution<\/h2>\n\n\n\n<p>After detecting <a href=\"https:\/\/confluence.atlassian.com\/security\/december-2023-security-advisories-overview-1318892103.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">four critical flaws<\/a>, which if successfully exploited, permitted threat actors to execute the code remotely, Atlassian had to take quick security measures and patch the vulnerabilities. All of the flaws got a CVSS score of 9 or higher and targeted different Atlassian tools.&nbsp;<\/p>\n\n\n\n<p>Thus, CVE-2023-22522, a template injection vulnerability found in the Confluence Data Center and Confluence Server, enabled code execution on the Confluence page by an authorized attacker, including the one with anonymous access.&nbsp;<\/p>\n\n\n\n<p>The second patched security flaw, aka CVE-2023-22523 with a CVSS score of 9.8, targeted Assets Discovery for Jira Service Management Cloud, Server, and Data Center. Hence, on machines running the Assets Discovery agent, the vulnerability permitted an attacker to carry out privileged remote code execution. The same result, the malicious actors could achieve with CVE-2023-22524, the CVSS score of which was 9.6. In this case, the hacker could execute the code by using WebSockets to bypass Atlassian Companion\u2019s blocklist and macOS Gatekeeper protections.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/gitprotect.io\/the-state-of-devops-threats-report.html?utm_source=blog&amp;utm_medium=ads&amp;utm_campaign=devops_threats\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-1024x512.png\" alt=\"\" class=\"wp-image-5610\" style=\"width:600px\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-1024x512.png 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-300x150.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-768x384.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-400x200.png 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-600x300.png 600w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads-800x400.png 800w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/blog-posts-ads.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p>The fourth was a deserialization vulnerability that the service provider had to address, the CVE-2022-1471 flaw in SnakeYAML library. It could lead to remote code execution in multiple Atlassian products and therefore, the CVSS score of the security flaw was as high as 9.8.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2023\/12\/atlassian-releases-critical-software.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>NOVEMBER 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>4 incidents<\/td><td>8 incidents<\/td><td>6 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>OCTOBER 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>3 incidents<\/td><td>8 incidents<\/td><td>5 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Atlassian Releases security advisory for Confluence data center and server<\/h2>\n\n\n\n<p>On October 4th, Atlassian released an advisory and urged its Confluence users to upgrade their solution to the latest fixed version as soon as possible, isolating vulnerable Confluence apps from the public Internet. All those measures were to address a vulnerability flaw that was assessed by the service provider to have the highest severity level of 10. By exploiting CVE-2023-22515 an external attacker could create unauthorized Confluence accounts and, consequently, access Confluence instances.&nbsp;<\/p>\n\n\n\n<p>Moreover, in <a href=\"https:\/\/confluence.atlassian.com\/security\/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">its advisory Atlassian <\/a>later updated: \u201c<em>We have evidence to suggest that a known nation-state actor is actively exploiting CVE-2023-22515 and continue to work closely with our partners and customers to investigate.<\/em>\u201d According to Microsoft, in its <a href=\"https:\/\/twitter.com\/msftsecintel\/status\/1711871732644970856?s=46&amp;t=u19CbogN0TP7iqFc4MlyEQ\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">notice on X<\/a>, the company informed that the vuln had already been exploited by cybercriminals for a little less than a month &#8211; since 14th September 2023. The company called the hackers exploiting the issue Storm-0062, yet they noted that other companies track those threat actors as DarkShadow or OroOIxy.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Microsoft has observed nation-state threat actor Storm-0062 exploiting CVE-2023-22515 in the wild since September 14, 2023. CVE-2023-22515 was disclosed on October 4, 2023. Storm-0062 is tracked by others as DarkShadow or Oro0lxy.<\/p>&mdash; Microsoft Threat Intelligence (@MsftSecIntel) <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1711871732644970856?ref_src=twsrc%5Etfw\">October 10, 2023<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/fsapartners.ed.gov\/knowledge-center\/library\/electronic-announcements\/2023-10-26\/alert-research-institutions-targeted-atlassian-confluence-data-center-and-server-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The U.S. Department of Education and Federal Student Aid<\/a> also monitored the issue. It concluded that nation-state actors were targeting research institutions by creating unauthorized Confluence administrator accounts and, as a result, could access Confluence instances and exfiltrate data.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/therecord.media\/chinese-govt-hackers-exploiting-atlassian\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Record. Recorded Future News<\/a>&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>SEPTEMBER 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">5 incidents<\/td><td>11 incidents<\/td><td>8 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Atlassian released security updates to patch 4 high-severity vulnerabilities<\/h2>\n\n\n\n<p><a href=\"https:\/\/confluence.atlassian.com\/security\/security-bulletin-september-19-2023-1283691616.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Four critical security flaws Atlassian<\/a> had to address in new versions of its products in September after those bugs had been discovered by the service provider via its Bug Bounty program, pen-testing processes, and third-party library scans.&nbsp;<\/p>\n\n\n\n<p>The first vulnerability, a remote code execution (RCE) bug in Bitbucket, tracked as CVE-2023-22513 with a CVSS score of 8.5 could impact confidentiality, integrity, and availability. As Atlassian explained, an authenticated threat actor could exploit the vulnerability and access data without any user interaction.&nbsp;<\/p>\n\n\n\n<p>The next security flaw, described as a denial-of-service (DoS) issue in Confluence Data Center and Server products, was tracked as CVE-2023-22512. It got a CVSS score of 7.5 and it could be used by the unauthenticated attacker to deny access to resources, \u201dby temporarily or indefinitely disrupting services of a vulnerable host connected to a network.\u201d<\/p>\n\n\n\n<p>Another security flaw, CVE-2023-28709, was described as a third-party dependency issue. Assessed by Atlassian at a 7.5 CVSS severity level, the threat actor could use the vulnerability to expose assets in the Bamboo user\u2019s environment which was susceptible to exploitation.&nbsp;<\/p>\n\n\n\n<p>The last of the patched four vulnerabilities was detected in Jira. Tracked as CVE-2022-25647 with a CVSS score of 7.5, the security flaw could allow a malicious actor to expose assets and then exploit them in their further deeds if they needed that.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.securityweek.com\/atlassian-security-updates-patch-high-severity-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Week<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>AUGUST 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>4 incidents<\/td><td>15 incidents<\/td><td>9 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>JULY 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>9 incidents<\/td><td>6 incidents<\/td><td>4 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Atlassian patches severe RCE vulnerability affected Confluence Data Center &amp; Server<\/h2>\n\n\n\n<p>After discovering high vulnerabilities through bug bounty programs, third-party library scans, and penetration testing, Atlassian released fixed versions to address those flows in Confluence Data Center and Server, and Bamboo Center. Three vulnerability flows &#8211; CVE-2023-22505 with a CVSS Score of 8, CVE-2023-22508 with a CVSS Score of 8.5, and CVE-2023-22506 with a CVSS Score of 7.5 &#8211; permitted an authenticated attacker to execute arbitrary code unless they are patched. Thus, they could severely impact CIA (confidentiality, integrity, and availability) without any user interaction.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/cybersecuritynews.com\/atlassian-rce-flaw\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cyber Security News<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>JUNE 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>6 incidents<\/td><td>11 incidents<\/td><td>9 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>MAY 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>5 incidents<\/td><td>8 incidents<\/td><td>5 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>APRIL 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>No incidents reported<\/td><td>4 incidents<\/td><td>6 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>MARCH 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>3 incidents<\/td><td>4 incidents<\/td><td>2 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>FEBRUARY 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>6 incidents<\/td><td>8 incidents<\/td><td>1 incident<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Atlassian patches critical security vulnerability in Jira<\/h2>\n\n\n\n<p>The Australian service provider released multiple patches to address critical security flow, tracked as <a href=\"https:\/\/confluence.atlassian.com\/kb\/faq-for-cve-2023-22501-1189797488.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-22501<\/a>, detected in Jira Service Management Server and Data Center. The vulnerability got a CVSS score of 9.4, as it could be used by threat actors to impersonate other Jira users and allow them to access the affected instances in two possible scenarios. The first one takes place when a user includes the attacker on Jira issues or requests. The second scenario happens if the JSM user\u2019s emails with the \u201cView Request\u201d link are forwarded to the attacker or he otherwise gains access to that email.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/jira.atlassian.com\/browse\/JSDSERVER-12312\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Atlassian explanation<\/a>, \u201c<em>With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into<\/em>.\u201d&nbsp;<\/p>\n\n\n\n<p>After the patches were released, Atlassian urged its Jira customers, who used affected Jira versions &#8211; 5.3.0, 5.3.1, 5.4.0, 5.4.1, and 5.5.0, to update their instances to the latest patched version to protect their data from hostile actors.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/atlassian-patches-critical-flaw\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Infosecurity Magazine<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Atlassian leaked data stolen via a third-party app<\/h2>\n\n\n\n<p>A hacking group called SiegedSec managed to breach one of Atlassian\u2019s employees and compromised his data within Envoy\u2019s app. Thus, the malicious gang could access staff information, including names, emails, departments, and Atlassian office floor plans located in San Francisco, USA, and Sydney, Australia.&nbsp;<\/p>\n\n\n\n<p>The nasty incident became infamous when a malicious group posted a cache of that employee\u2019s data. According to the Envoy\u2019s spokesperson, both companies\u2019 security teams collaborated to \u201c<em>identify the source of the data compromise<\/em>\u201d. Hopefully, no critical data has been revealed.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.darkreading.com\/endpoint-security\/leaked-atlassian-data-stolen-from-third-party-app-company-says-\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dark Reading<\/a><\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>JANUARY 2023<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Atlassian Status info for Bitbucket:<\/strong><\/td><td><strong>Atlassian Status info for Jira Software, JSM, JWM, and Jira Product Discovery<\/strong><\/td><td><strong>Atlassian Status info for Confluence:<\/strong><\/td><\/tr><tr><td>No incidents reported<\/td><td>2 incidents<\/td><td>3 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How to secure your data?<\/h2>\n\n\n\n<p>Vulnerabilities and security flows were the main threats that Atlassian users faced in 2023. Moreover, if you go through Atlassian Status, you will notice that some small outages took place, as well. For example, the<a href=\"https:\/\/bitbucket.status.atlassian.com\/incidents\/tv5szx9l36s6\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> Bitbucket Cloud operations outage<\/a> in&nbsp; November, or <a href=\"https:\/\/jira-software.status.atlassian.com\/incidents\/b2mvc4m0cbp4\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the media outage that affected multiple Atlassian services<\/a> in August. We have even dived deeper and counted how many incidents Bitbucket, Jira, and Confluence faced this year. Here is the result:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td>Bitbucket<\/td><td>48 incidents<\/td><\/tr><tr><td>Jira Software, Jira Service Management, Jira Workmanagement, Jira Product Discovery (all together)<\/td><td>91 incidents<\/td><\/tr><tr><td>Confluence<\/td><td>62 incidents<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Unfortunately, outages and vulnerabilities can\u2019t be avoided. However, you can act proactively and protect your data. Keeping passwords, credentials, and authentication tokens in secure places, enabling 2FA, secret scanning, and using <a href=\"https:\/\/gitprotect.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">professional backup tools<\/a> are among those <a href=\"https:\/\/gitprotect.io\/blog\/atlassian-security-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Atlassian security best practices<\/a>, that can help to avoid disruptions, eliminate data loss, and guarantee business continuity.&nbsp;<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#fafafa\"><strong>Useful resources<\/strong>:<br><a href=\"https:\/\/gitprotect.io\/blog\/jira-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jira backup best practices<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/bitbucket-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitbucket backup best practices<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/introducing-to-jira-security-best-practices-for-protecting-your-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jira security best practices<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/atlassian-cloud-shared-responsibility-model-are-you-aware-of-your-duties\/\" target=\"_blank\" rel=\"noreferrer noopener\">Atlassian Shared Responsibility Model<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/top-2023-resources-for-the-devops-career-roadmap\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top 2023 Resources for the DevOps career roadmap<\/a><br><a href=\"https:\/\/gitprotect.io\/gitprotect-newsletter.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitProtect DevSecOps X-Ray Newsletter &#8211; your guide to the latest DevOps &amp; security insights<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[FREE TRIAL] Automate DevOps backup and don\u2019t risk data, time and money<\/strong><\/a><strong> \ud83d\ude80<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/calendly.com\/d\/3s9-n9z-pgc\/gitprotect-live-demo?month=2024-01\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[LIVE DEMO] Let\u2019s discuss your needs and see a live product tour<\/strong><\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome back to our second article in the series of DevOps-related incidents and failures. If you missed our previous review, don\u2019t hesitate and catch up with it: Infamous GitHub-related incidents and threats: 2023 in Review.<\/p>\n","protected":false},"author":8,"featured_media":4730,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,2,73],"tags":[],"class_list":["post-4728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bitbucket","category-git-backup-101","category-jira","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Atlassian security incidents: 2023 in Review - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atlassian security incidents: 2023 in Review - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"Welcome back to our second article in the series of DevOps-related incidents and failures. If you missed our previous review, don\u2019t hesitate and catch up with it: Infamous GitHub-related incidents and threats: 2023 in Review.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T15:54:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-08T12:19:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/\"},\"author\":{\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\"},\"headline\":\"Atlassian security incidents: 2023 in Review\",\"datePublished\":\"2024-01-08T15:54:49+00:00\",\"dateModified\":\"2024-08-08T12:19:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/\"},\"wordCount\":1704,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg\",\"articleSection\":[\"Bitbucket\",\"Git Backup 101\",\"Jira\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/\",\"name\":\"Atlassian security incidents: 2023 in Review - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg\",\"datePublished\":\"2024-01-08T15:54:49+00:00\",\"dateModified\":\"2024-08-08T12:19:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Atlassian security incidents: 2023 in Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\",\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"caption\":\"Daria Kulikova, Content Writer at GitProtect.io\"},\"description\":\"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Atlassian security incidents: 2023 in Review - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/","og_locale":"en_US","og_type":"article","og_title":"Atlassian security incidents: 2023 in Review - Blog | GitProtect.io","og_description":"Welcome back to our second article in the series of DevOps-related incidents and failures. If you missed our previous review, don\u2019t hesitate and catch up with it: Infamous GitHub-related incidents and threats: 2023 in Review.","og_url":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2024-01-08T15:54:49+00:00","article_modified_time":"2024-08-08T12:19:04+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg","type":"image\/jpeg"}],"author":"Daria Kulikova, Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Daria Kulikova, Content Writer at GitProtect.io","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/"},"author":{"name":"Daria Kulikova, Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3"},"headline":"Atlassian security incidents: 2023 in Review","datePublished":"2024-01-08T15:54:49+00:00","dateModified":"2024-08-08T12:19:04+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/"},"wordCount":1704,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg","articleSection":["Bitbucket","Git Backup 101","Jira"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/","url":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/","name":"Atlassian security incidents: 2023 in Review - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg","datePublished":"2024-01-08T15:54:49+00:00","dateModified":"2024-08-08T12:19:04+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/01\/Atlassian-Security-incidents-2023-in-review.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/atlassian-security-incidents-2023-in-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Atlassian security incidents: 2023 in Review"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3","name":"Daria Kulikova, Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","caption":"Daria Kulikova, Content Writer at GitProtect.io"},"description":"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.","url":"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=4728"}],"version-history":[{"count":8,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4728\/revisions"}],"predecessor-version":[{"id":5614,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4728\/revisions\/5614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/4730"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=4728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=4728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=4728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}