Atlassian JIRA 6.4.x < 6.4.9 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 9735

Synopsis

The remote web server hosts an application that is vulnerable to multiple attack vectors.

Description

The version of JIRA installed on the remote host is earlier than 6.4.9 and is affected by multiple vulnerabilities :

- A flaw exists in the 'UpdateMyJiraHome.jspa' script that is triggered as input passed via the 'target' parameter. This may allow a remote attacker to inject arbitrary HTML content.
- A flaw exists in AppPortalPage that is triggered as input passed via the 'clonsePageId' parameter. This may allow a remote attacker to inject arbitrary HTML content.
- A flaw exists that is due to the program storing credential information in plaintext in the 'atlassian-jira-http-dump.log' file. This may allow an attacker to gain access to credential information.
- A flaw exists in the Advanced JQL Search functionality in the REST API that is due to the program ignoring the 'User email visibility' option. This may allow a remote attacker to gain access to user email addresses.

Solution

Update to JIRA 6.4.x version 6.4.9 or later.

See Also

https://jira.atlassian.com/browse/JRA-43627

Plugin Details

Severity: Medium

ID: 9735

Family: CGI

Published: 2016/11/04

Updated: 2019/03/06

Dependencies: 9541

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3.0

Base Score: 5.3

Temporal Score: 5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Patch Publication Date: 2015/07/29

Vulnerability Publication Date: 2015/07/31