Atlassian JIRA Server-Side Request Forgery (SSRF) Vulnerability (JRASERVER-68527)

Medium Nessus Plugin ID 124770


The remote web server hosts a web application that is potentially affected by a server-side request forgery vulnerability.


According to its self-reported version number, the instance of Atlassian JIRA hosted on the remote web server is prior to 7.6.10 or 7.7.x prior to 7.7.5 or 7.8.x prior to 7.8.5 or 7.9.x prior to 7.9.3 or 7.10.x prior 7.10.3 or 7.11.x prior to 7.11.3 or 7.12.x prior to 7.12.3 or 7.13.x prior to 7.13.1. It is, therefore, affected by a server-side request forgery vulnerability. A remote attacker, with administrator privileges, may exploit this vulnerability to determine the existence of internal hosts & open ports and obtain sensitive server information.


Upgrade to Atlassian JIRA version 7.6.10 / 7.7.5 / 7.8.5 / 7.9.3 / 7.10.3 / 7.11.3 / 7.12.3 / 7.13.1 or later.

See Also

Plugin Details

Severity: Medium

ID: 124770

File Name: jira_7_13_1_cve_2018_13404.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 2019/05/10

Updated: 2019/10/30

Dependencies: 45577

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-13404

CVSS v2.0

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 4.1

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Required KB Items: installed_sw/Atlassian JIRA, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/01/29

Vulnerability Publication Date: 2018/12/03

Reference Information

CVE: CVE-2018-13404

BID: 107039

IAVA: 2019-A-0141