Atlassian JIRA < 4.2.2 Open Redirect

medium Nessus Plugin ID 85216

Synopsis

The remote web server hosts a web application that is potentially affected by an open redirect vulnerability.

Description

According to its self-reported version number, the version of Atlassian JIRA hosted on the remote web server is prior to version 4.2.2. It is, therefore, potentially affected by an open redirect vulnerability due to improper sanitization of user-supplied input to an unspecified parameter. A remote attacker, by enticing a user into following a crafted URL, can exploit this vulnerability to redirect the user to an attacker-controlled website.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Atlassian JIRA 4.2.2 or later, or apply the vendor supplied patch if running JIRA version 4.1.2.

See Also

http://www.nessus.org/u?100fec0e

Plugin Details

Severity: Medium

ID: 85216

File Name: jira_4_2_2.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 8/4/2015

Updated: 6/5/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Required KB Items: Settings/ParanoidReport, installed_sw/Atlassian JIRA

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/21/2011

Vulnerability Publication Date: 2/21/2011

Reference Information

BID: 46461