Atlassian JIRA < 7.13.4 / 8.0.x < 8.1.1 Multiple Vulnerabilities (SB19-147)
Medium Nessus Plugin ID 125629
SynopsisThe remote web server hosts a web application that is potentially affected by multiple vulnerabilities.
DescriptionAccording to its self-reported version number, the instance of Atlassian JIRA hosted on the remote web server is potentially affected by multiple vulnerabilities:
- A directory traversal vulnerability exists in the CachingResourceDownloadRewriteRule due to an ineffective path access check. An unauthenticated, remote attacker can exploit this by accessing files in the Jira webroot under the META-INF.
- A session management vulnerability exists in the administrators session due to improper access control. An unauthenticated, remote attacker can exploit this to bypass WebSudo authentication and access the ViewUpgrades administrative resource. (CVE-2019-8443)
- An information disclosure vulnerability exists in the ManageFilters.jspa and the /rest/api/2/user/picker rest resources due to incorrect authorization checks. An unauthenticated, remote attacker can exploit this to enumerate usernames. (CVE-2019-3401, CVE-2019-3403)
- A cross-site scripting (XSS) vulnerability exists due to improper validation of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.
SolutionUpgrade to Atlassian JIRA version 7.13.4 / 8.1.1 or later.