Atlassian JIRA 6.4.x < 6.4.10 CSRF / XSRF (Bar Mitzvah)

low Nessus Network Monitor Plugin ID 9736

Synopsis

The remote web server hosts an application that is vulnerable to a Cross-Site Request Forgery (CSRF/XSRF) attack vectors.

Description

The version of JIRA installed on the remote host is earlier than 6.4.10 and is affected by a flaw as HTTP requests to '/EditCustomFieldOptions!default.jspa' do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to add new custom fields.
- A flaw exists in the issue collector in the REST API as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to perform unspecified actions.

Solution

Update to JIRA 6.4.x version 6.4.10 or later.

See Also

https://jira.atlassian.com/browse/JRA-28072

Plugin Details

Severity: Low

ID: 9736

Family: CGI

Published: 11/4/2016

Updated: 3/6/2019

Nessus ID: 87218

Risk Information

VPR

Risk Factor: Low

Score: 2.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Patch Publication Date: 8/21/2012

Vulnerability Publication Date: 5/4/2012

Reference Information

CVE: CVE-2015-2808