Atlassian JIRA 6.0.x < 6.0.4 Directory Traversal

Medium Nessus Network Monitor Plugin ID 9731


The remote web server hosts an application that is vulnerable to a directory traversal attack vector.


The version of JIRA installed on the remote host is earlier than 6.0.4 and is affected by a flaw in the Issue Collector plugin within 'rest/' that allows traversing outside of a restricted path. The issue is due to the 'filename' POST parameter not being properly sanitized, specifically allowing path traversal style attacks (e.g. '../'). With a specially crafted request, a remote attacker can write files to arbitrary locations on the system.


Update to JIRA 6.0.x version 6.0.4 or later.

See Also

Plugin Details

Severity: Medium

ID: 9731

Family: CGI

Published: 2016/11/04

Updated: 2019/03/06

Dependencies: 9541

Nessus ID: 73272

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3.0

Base Score: 3.6

Temporal Score: 3.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Patch Publication Date: 2014/02/26

Vulnerability Publication Date: 2014/02/26

Exploitable With

Metasploit (JIRA Issues Collector Directory Traversal)

Reference Information

CVE: CVE-2014-2314

BID: 65849