Atlassian JIRA 6.0.x < 6.0.4 Directory Traversal

low Nessus Network Monitor Plugin ID 9731

Synopsis

The remote web server hosts an application that is vulnerable to a directory traversal attack vector.

Description

The version of JIRA installed on the remote host is earlier than 6.0.4 and is affected by a flaw in the Issue Collector plugin within 'rest/TemporaryAttachmentsResource.java' that allows traversing outside of a restricted path. The issue is due to the 'filename' POST parameter not being properly sanitized, specifically allowing path traversal style attacks (e.g. '../'). With a specially crafted request, a remote attacker can write files to arbitrary locations on the system.

Solution

Update to JIRA 6.0.x version 6.0.4 or later.

See Also

https://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2014-02-26

https://jira.atlassian.com/browse/JRA-36442

Plugin Details

Severity: Low

ID: 9731

Family: CGI

Published: 11/4/2016

Updated: 3/6/2019

Nessus ID: 73272

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Patch Publication Date: 2/26/2014

Vulnerability Publication Date: 2/26/2014

Exploitable With

Metasploit (JIRA Issues Collector Directory Traversal)

Reference Information

CVE: CVE-2014-2314

BID: 65849