Atlassian Jira 8.14.x < 8.20.10 Server-Side Request Forgery

medium Web App Scanning Plugin ID 113269

Synopsis

Atlassian Jira 8.14.x < 8.20.10 Server-Side Request Forgery

Description

According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is 8.0.x prior to 8.13.22, 8.14.x prior to 8.20.10 or 8.21.x prior to 8.21.4. It is, therefore, affected by a vulnerability allowing a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Atlassian Jira version 8.20.10 or later.

See Also

https://jira.atlassian.com/browse/JRASERVER-73863

Plugin Details

Severity: Medium

ID: 113269

Type: remote

Published: 7/8/2022

Updated: 3/14/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2022-26135

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: CVE-2022-26135

Vulnerability Information

CPE: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/27/2022

Vulnerability Publication Date: 5/27/2022

Reference Information

CVE: CVE-2022-26135