Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Atlassian JIRA 6.4.x < 6.4.10 Multiple CSRF / XSRF

Medium

Synopsis

The remote web server hosts an application that is vulnerable to multiple Cross-Site Request Forgery (CSRF/XSRF) attack vectors.

Description

The version of JIRA installed on the remote host is earlier than 6.4.10 and is affected by a flaw as HTTP requests to '/EditCustomFieldOptions!default.jspa' do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to add new custom fields. (OSVDB 125206) - A flaw exists in the issue collector in the REST API as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a CSRF/XSRF attack causing the victim to perform unspecified actions. (OSVDB 126133)

Solution

Update to JIRA 6.4.x version 6.4.10 or later.