A security issue was fixed on December, 7th 2020.
Nature of the issue
A security vulnerability was recently identified in Elements Copy & Sync.
The vulnerability affected version 1.0.6-AC of Elements Copy & Sync. The vulnerability meant that Copy & Sync recipe configuration may have been compromised from October, 1st to December, 7th.
This vulnerability has been rated as medium, according to the scale published on the Common Vulnerability Scoring System (CVSS).
The vulnerability was brought to our attention by our own security assessment.
Based on our investigations, the vulnerability may have lead Jira users without admin privileges to create, update, or delete copy recipes within the Copy & Sync administration.
This only impacted Copy & Sync recipes created on Jira instances, no Jira data was compromised.
Analysis and actions taken
Once we became aware of the issue, we reproduced and identified the problem's origin, which was that user roles were not checked when calls were made to the Copy & Sync API. Based on what we found, we added a verification of user roles when the JWT checks are being done. This vulnerability is now fixed.
Then we worked with Atlassian to update the Atlassian Marketplace with an updated listing of our app that is free from this vulnerability.
No further action is required from any user at this point.
We want you to know that we take this issue very seriously. We are conducting a thorough review of our internal processes to ensure this does not occur again for you and our other customers.
If you have any questions, please feel free to raise a support request at support.elements-apps.com.