Atlassian JIRA 6.4.x < 6.4.9 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 9735

Synopsis

The remote web server hosts an application that is vulnerable to multiple attack vectors.

Description

The version of JIRA installed on the remote host is earlier than 6.4.9 and is affected by multiple vulnerabilities :

- A flaw exists in the 'UpdateMyJiraHome.jspa' script that is triggered as input passed via the 'target' parameter. This may allow a remote attacker to inject arbitrary HTML content.
- A flaw exists in AppPortalPage that is triggered as input passed via the 'clonsePageId' parameter. This may allow a remote attacker to inject arbitrary HTML content.
- A flaw exists that is due to the program storing credential information in plaintext in the 'atlassian-jira-http-dump.log' file. This may allow an attacker to gain access to credential information.
- A flaw exists in the Advanced JQL Search functionality in the REST API that is due to the program ignoring the 'User email visibility' option. This may allow a remote attacker to gain access to user email addresses.

Solution

Update to JIRA 6.4.x version 6.4.9 or later.

See Also

https://jira.atlassian.com/browse/JRA-43627

Plugin Details

Severity: Medium

ID: 9735

Family: CGI

Published: 11/4/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Patch Publication Date: 7/29/2015

Vulnerability Publication Date: 7/31/2015