CVE-2023-22524
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on macOS systems running vulnerable versions of the Atlassian Companion App. Attackers can bypass the app's blocklist and macOS Gatekeeper protections via WebSockets. Affected users are those running the Atlassian Companion App on macOS.
💻 Affected Systems
- Atlassian Companion App
📦 What is this software?
Companion by Atlassian
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to install malware, steal data, pivot to other systems, and maintain persistent access.
Likely Case
Attacker gains initial foothold on target system, potentially leading to data exfiltration or ransomware deployment.
If Mitigated
Attack prevented through patching or workarounds, with minimal to no impact on systems.
🎯 Exploit Status
WebSocket-based attack bypasses multiple security controls. No authentication required for exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.2.0 and later
Vendor Advisory: https://confluence.atlassian.com/security/cve-2023-22524-rce-vulnerability-in-atlassian-companion-app-for-macos-1319249492.html
Restart Required: Yes
Instructions:
1. Open Atlassian Companion App. 2. Check for updates in app settings. 3. Update to version 2.2.0 or later. 4. Restart the application.
🔧 Temporary Workarounds
Uninstall Atlassian Companion App
macosRemove the vulnerable application entirely to eliminate the attack surface.
sudo rm -rf /Applications/Atlassian\ Companion.app
rm -rf ~/Library/Application\ Support/Atlassian\ Companion
Disable WebSocket connections
macosBlock WebSocket traffic to the Atlassian Companion App using firewall rules.
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --add /Applications/Atlassian\ Companion.app/Contents/MacOS/Atlassian\ Companion
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --block /Applications/Atlassian\ Companion.app/Contents/MacOS/Atlassian\ Companion
🧯 If You Can't Patch
- Uninstall the Atlassian Companion App immediately
- Implement network segmentation to isolate systems with the vulnerable app
🔍 How to Verify
Check if Vulnerable:
Check Atlassian Companion App version in About section or via: mdls -name kMDItemVersion /Applications/Atlassian\ Companion.app
Check Version:
mdls -name kMDItemVersion /Applications/Atlassian\ Companion.app
Verify Fix Applied:
Confirm version is 2.2.0 or higher using: mdls -name kMDItemVersion /Applications/Atlassian\ Companion.app
📡 Detection & Monitoring
Log Indicators:
- Unusual WebSocket connections to Atlassian Companion process
- Process execution from unexpected locations
- Gatekeeper bypass attempts in system logs
Network Indicators:
- WebSocket traffic to Atlassian Companion App on non-standard ports
- Unusual outbound connections from Atlassian Companion process
SIEM Query:
process_name:"Atlassian Companion" AND (event_type:process_execution OR event_type:network_connection)
🔗 References
- https://confluence.atlassian.com/security/cve-2023-22524-rce-vulnerability-in-atlassian-companion-app-for-macos-1319249492.html
- https://jira.atlassian.com/browse/CONFSERVER-93518
- https://confluence.atlassian.com/security/cve-2023-22524-rce-vulnerability-in-atlassian-companion-app-for-macos-1319249492.html
- https://jira.atlassian.com/browse/CONFSERVER-93518