Atlassian JIRA 6.4.x < 6.4.10 Multiple CSRF / XSRF

Medium Nessus Network Monitor Plugin ID 9736

Synopsis

The remote web server hosts an application that is vulnerable to multiple Cross-Site Request Forgery (CSRF/XSRF) attack vectors.

Description

The version of JIRA installed on the remote host is earlier than 6.4.10 and is affected by a flaw as HTTP requests to '/EditCustomFieldOptions!default.jspa' do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to add new custom fields. (OSVDB 125206)
- A flaw exists in the issue collector in the REST API as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to perform unspecified actions. (OSVDB 126133)

Solution

Update to JIRA 6.4.x version 6.4.10 or later.

See Also

https://jira.atlassian.com/browse/JRA-28072

Plugin Details

Severity: Medium

ID: 9736

File Name: 9736.prm

Family: CGI

Published: 2016/11/04

Modified: 2016/11/23

Dependencies: 9541

Nessus ID: 87218

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 3.6

Temporal Score: 3.4

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Patch Publication Date: 2012/08/21

Vulnerability Publication Date: 2012/05/04