Atlassian JIRA 6.4.x < 6.4.10 CSRF / XSRF (Bar Mitzvah)

Medium Nessus Network Monitor Plugin ID 9736

Synopsis

The remote web server hosts an application that is vulnerable to a Cross-Site Request Forgery (CSRF/XSRF) attack vectors.

Description

The version of JIRA installed on the remote host is earlier than 6.4.10 and is affected by a flaw as HTTP requests to '/EditCustomFieldOptions!default.jspa' do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to add new custom fields.
- A flaw exists in the issue collector in the REST API as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to perform unspecified actions.

Solution

Update to JIRA 6.4.x version 6.4.10 or later.

See Also

https://jira.atlassian.com/browse/JRA-28072

Plugin Details

Severity: Medium

ID: 9736

Family: CGI

Published: 2016/11/04

Updated: 2019/03/06

Dependencies: 9541

Nessus ID: 87218

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3.0

Base Score: 3.6

Temporal Score: 3.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Patch Publication Date: 2012/08/21

Vulnerability Publication Date: 2012/05/04

Reference Information

CVE: CVE-2015-2808