Update Log
Please always follow original links and official vendor documentation. We cannot guarantee that information has been changed after publication of this log.
Date | Note | Reference |
---|---|---|
| CVE-2021-4428 discovered | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228 |
| Atlassian released general information | https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html |
5:30pm | Based on FAQ, sent out warning to all K15t support customers
| |
11:45pm UTC | Atlassian released a Security Advisory | Multiple Products Security Advisory - Log4j Vulnerable To Remote Code Execution - CVE-2021-44228 |
| K15t setup a this resources page | |
11:00am | ATTENTION
If you use Bitbucket, don’t forget to check Elasticsearch and modify JVM option as described in community link:
| |
6:10pm | Security Advisory sent out to all K15t customer (support and license)
| |
5:30am | Second Log4j vulnerability published (CVE-2021-44228) + CVE-2021-45046
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 |
10am | UPDATED BELOW Is Bitbucket vulnerable through Elasticsearch?
| |
11:30am | Read Adaptavist’s evaluation about Script Runner: Adaptavist's apps on the Atlassian Marketplace are not directly impacted by this issue and there are no actions needed to address the vulnerability. | |
12:10pm |
| |
| New Log4j related newly discovered vulnerabilities (see below).
Atlassian has detected these vulnerabilities in both Jira and Confluence server and is working on further analysis. We expect Atlassian to publish an official statement anytime soon. |