Atlassian Connect Detection Scanner
This scanner detects the use of Atlassian Connect in digital assets.
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
3 weeks 12 hours
Scan only one
URL
Toolbox
-
Atlassian Connect is a framework used by developers to build add-ons that can be extended to Atlassian applications, such as Jira and Confluence. It allows for seamless integration with these applications and to enhance their functionality by providing custom features. The framework is popular among developers creating applications for project management, software development, and team collaboration. The descriptor file is essential as it defines the app's behavior and interaction with the host application. The JSON descriptor provides a standardized method for declaring the metadata of an app and the modules it supports. Atlassian Connect is widely adopted as companies seek to customize their Atlassian tools to better fit their workflows.
The vulnerability detected is related to the presence of the Atlassian Connect JSON descriptor file. This descriptor file is crucial for defining how an app interacts with the host Atlassian application. Improper handling or misconfiguration of this file might expose sensitive app data or configuration vulnerabilities. As a technology detection template, the scanner identifies if the specific file (`atlassian-connect.json`) exists on the server and confirms its accessibility. Access to the descriptor file can potentially provide insights into the app's structure and the third-party services it might depend on. Detection of the file is the first step in assessing whether a misconfiguration could lead to further security issues.
Technically, the scanner sends a GET request to the server, targeting the path that commonly hosts the Atlassian Connect descriptor file. It checks for specific keywords within the file, such as "name," "vendor," "key," "baseUrl," and "authentication", confirming the presence of the descriptor file. The response is verified for correct content type by inspecting the headers to ensure it is served as JSON. Additionally, it checks for a successful HTTP response status code of 200 to confirm that the file is accessible. Any matches indicate the presence of the descriptor file, affirming that Atlassian Connect is implemented within the server environment.
If an attacker is able to access the Atlassian Connect descriptor file, they might learn about the modules the application is utilizing and the permissions it requests, providing an opportunity to exploit any misconfigured settings. Unauthorized access to this file might lead to further exploitation, such as privilege escalation or data exposure, if sensitive configurations are misplaced in the descriptor. The detection of this file supports identifying early security misconfigurations before they are exploited. Moreover, attackers may use this information to sophisticate their attacks to aim vulnerabilities specific to the modules listed in the descriptor.
REFERENCES