Hello,
We want to detect exploitation attempts against this vulnerability. Can you recommend us anything? To me specific, could you please share the pattern we need to look for in the logs to identify abuse attempts against this vulnerability
Hello, Uzeyir,
Unfortunately there's no way to detect through the logs that the exploit has been used.
We recommend following https://confluence.atlassian.com/jira/jira-security-advisory-2022-04-20-1115127899.html for any updates and aiming to upgrade to correct the vulnerability or mitigate using the methods provided in the page.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.