Skip to main content
Skip table of contents

2024-08-29 - P3 Security Issue

Nature of the issue

This vulnerability was introduced in the app initial version released on June 3rd 2024 and describes as follows: an unauthorized user can invoke Forge functions using GraphQL.

This vulnerability was brought to our notice by the Bug Bounty Program on 29 June 2024.

Impact

The impact of this vulnerability is moderate.

A regular Jira user (originally without access to Elements Pulse in Jira) could potentially access certain administrative settings in Elements Pulse by manipulating network requests and perform administrative actions within the application (delete profile, create survey, set goals).

Based on our investigations, the vulnerability has not been exploited. 

Analysis and actions taken

After reproducing the issue on our side, a unit was activated to collect all necessary information and investigation findings, and develop a fix for the issue and deploy it the soonest possible.

To fix the issue, we added security checks on all services impacted. Users rights are now checked each time a Forge function is called.

 The fixed version was released following the usual CI procedure on 29 August 2024.

We conducted thorough non-regression tests manually to confirm the resolution of the issue.

Conclusion

We want you to know that we take this issue very seriously. We are conducting a thorough review of our internal processes to ensure this does not occur again for our customers.
If you have any questions, please feel free to raise a support request at support.elements-apps.com referencing "XLA-162".

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.