content of email:
the imbedded URL address looks suspicious...
Earlier this week, an independent researcher contacted certain Jive customer administrators regarding an critical security vulnerability present in their communities. Jive has confirmed the issue, and is resolving on your behalf. More information on the vulnerability can be found in this blog post on the Jive Community.
To mitigate the issue as quickly as possible for Cloud customers, Jive rolled out a rule change to it's Web Application Firewall (WAF) last night to block this vulnerability from being exploited. Any requests to the vulnerable endpoint containing exploit code will be blocked and all other site features will continue to function normally, including non-malicious requests to the vulnerable endpoint.
The change is being made today (April 14) at 1900 Pacific. There should be no direct impact to customers, and no downtime is expected.
If you have further questions, please file a support case in your secure MyJive Support Group on the Jive Community. We appreciate your patience as we work to ensure the security of your Jive Community.
This email contains confidential information shared between Jive and its customers. Do not share or redistribute this communication.