Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Atlassian JIRA 6.4.x < 6.4.9 Multiple Vulnerabilities

Medium

Synopsis

The remote web server hosts an application that is vulnerable to multiple attack vectors.

Description

The version of JIRA installed on the remote host is earlier than 6.4.9 and is affected by multiple vulnerabilities :

- A flaw exists in the 'UpdateMyJiraHome.jspa' script that is triggered as input passed via the 'target' parameter. This may allow a remote attacker to inject arbitrary HTML content. (OSVDB 123514) - A flaw exists in AppPortalPage that is triggered as input passed via the 'clonsePageId' parameter. This may allow a remote attacker to inject arbitrary HTML content. (OSVDB 123515) - A flaw exists that is due to the program storing credential information in plaintext in the 'atlassian-jira-http-dump.log' file. This may allow an attacker to gain access to credential information. (OSVDB 125682) - A flaw exists in the Advanced JQL Search functionality in the REST API that is due to the program ignoring the 'User email visibility' option. This may allow a remote attacker to gain access to user email addresses. (OSVDB 125683)

Solution

Update to JIRA 6.4.x version 6.4.9 or later.