Atlassian JIRA 4.2.x < 5.1 XSRF

medium Nessus Plugin ID 85219

Synopsis

The remote web server hosts a web application that is potentially affected by a cross-site request forgery vulnerability.

Description

According to its self-reported version number, the version of Atlassian JIRA hosted on the remote web server is 4.2.x prior to 5.1.
It is, therefore, potentially affected by a cross-site request forgery vulnerability, which could allow a remote attacker to trick a victim into posting issue comments of the attacker's choosing.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Atlassian JIRA 5.1 or later.

See Also

http://www.nessus.org/u?92bd5816

Plugin Details

Severity: Medium

ID: 85219

File Name: jira_5_1.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 8/4/2015

Updated: 6/5/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Required KB Items: Settings/ParanoidReport, installed_sw/Atlassian JIRA

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/28/2012

Vulnerability Publication Date: 8/28/2012

Reference Information

BID: 55253