https://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ for further information.
In general, please update the SAML SSO plugins to the latest versions, especially for versions 2.0.8 to 2.5.0 and 3.0.0 to 3.1.5 of the SAML SSO plugin.
For versions 2.5.1 to 2.5.4 and 3.1.6 to 3.3.1, one important attack vector was closed, but please also considering updating the plugin.
If you cannot update the plugin, configure your reverse proxy to prevent cache poisoning with alternative host headers, e.g. by deactivating caching at all or by not using the Atlassian app as the default backend. Please note, that this does not close all attack vectors.
If you need help with either if these courses of action, please raise a support request via our Support Portal.
If you have questions or concerns regarding this advisory, please raise a support request via our Support Portal.