Atlassian Jira 7.13.x < 7.13.4, 8.0.x < 8.0.4, 8.1.x < 8.1.1 Multiple Vulnerabilities

Medium Nessus Plugin ID 125629


The remote web server hosts a web application that is potentially affected by multiple vulnerabilities.


According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is potentially affected by multiple vulnerabilities:

- A directory traversal vulnerability exists in the CachingResourceDownloadRewriteRule class due to an ineffective path access check. An unauthenticated, remote attacker can exploit this, by accessing files in the Jira webroot under the META-INF. (CVE-2019-8442)

- An authentication bypass vulnerability exists in the ViewUpgrades resource due to an improper access control. An unauthenticated, remote attacker can exploit this, to bypass WebSudo authentication and access the ViewUpgrades administrative resource. (CVE-2019-8443)


Upgrade to Atlassian Jira version 7.13.4 / 8.1.1 or later.

See Also

Plugin Details

Severity: Medium

ID: 125629

File Name: jira_7_13_4.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 2019/05/31

Updated: 2019/12/04

Dependencies: 45577

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2019-8443

CVSS v2.0

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Required KB Items: installed_sw/Atlassian JIRA, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2019/05/20

Vulnerability Publication Date: 2019/05/20

Reference Information

CVE: CVE-2019-8442, CVE-2019-8443

BID: 108458, 108460

IAVA: 2019-A-0402