The remote web server hosts an application that is vulnerable to multiple attack vectors.
Description
The version of JIRA installed on the remote host is earlier than 6.4.9 and is affected by multiple vulnerabilities : - A flaw exists in the 'UpdateMyJiraHome.jspa' script that is triggered as input passed via the 'target' parameter. This may allow a remote attacker to inject arbitrary HTML content. - A flaw exists in AppPortalPage that is triggered as input passed via the 'clonsePageId' parameter. This may allow a remote attacker to inject arbitrary HTML content. - A flaw exists that is due to the program storing credential information in plaintext in the 'atlassian-jira-http-dump.log' file. This may allow an attacker to gain access to credential information. - A flaw exists in the Advanced JQL Search functionality in the REST API that is due to the program ignoring the 'User email visibility' option. This may allow a remote attacker to gain access to user email addresses.