SynopsisThe remote web server hosts a web application that is affected by a cross-site request forgery vulnerability.
DescriptionAccording to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is version 7.13.x prior to 8.6.0. It is, therefore, affected by a flaw in the JMX monitoring component. An unauthenticated, remote attacker can exploit this by tricking a user into visiting a specially crafted web page, allowing the attacker to turn the JMX monitoring flag off or on.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
SolutionUpgrade to Atlassian Jira version 8.6.0 or later.