SynopsisThe remote web server hosts an application that is vulnerable to multiple Cross-Site Request Forgery (CSRF/XSRF) attack vectors.
DescriptionThe version of JIRA installed on the remote host is earlier than 6.1.5 and is affected by multiple CSRF/XSRF vulnerabilities :
Multiple flaws exist as HTTP requests to the following components do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions :
- 'Undo' method of 'FavouriteResource.java'
- 'updateUserAvatar' method of 'ProjectAvatarResource.java'
- 'setCurrent' method of 'ProjectCategoriesResource.java'
- 'getRenderedContent' method of 'RenderersResource.java'
- 'validateProject' method of 'ValidationResource.java'
- 'updateUserAvatar', 'createAvatarFromTermporary', 'storeTemporaryAvatar', and 'storeTemporaryAvatarUsingMultiPart' methods of 'UserResource.java'
- 'storeTemporaryAvatar' and 'storeTemporaryAvatarUsingMultiPart' methods of 'ProjectResource.java'
- 'validate' and 'testHandler' methods of 'MessageHandlersResource.java'
- 'addVoter' and 'addWatcher' methods of 'IssueResource.java'
- 'watchIssue' and 'voteIssue' methods of 'JiraInlineActionResource.java'
By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to manipulate settings.
SolutionUpdate to JIRA 6.1.x version 6.1.5 or later.