Hello,
We want to detect exploitation attempts against this vulnerability. Can you recommend us anything? To me specific, could you please share the pattern we need to look for in the logs to identify abuse attempts against this vulnerability
Hello, Uzeyir,
Unfortunately there's no way to detect through the logs that the exploit has been used.
We recommend following https://confluence.atlassian.com/jira/jira-security-advisory-2022-04-20-1115127899.html for any updates and aiming to upgrade to correct the vulnerability or mitigate using the methods provided in the page.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.