News

Atlassian developers find critical vulnerabilities in Jira Service Desk

Atlassian developers released security updates for Jira and Jira Service Desk (in versions * Server and * Data Center), eliminating two critical vulnerabilities. Attackers could use them to get sensitive information or remotely execute malicious code on the system.

Vulnerability CVE-2019-14994 in Jira Service Desk belongs to the category “directory traversal” (URL Path Traversal) and allows access to the portal to bypass restrictions and view the failure records of all Jira Service Desk, Jira Core and Jira Software projects.

“Jira Service Desk provides customer portal users only with the permissions to raise requests and view issues, so that they would interact with the portal without having direct access to Jira. Due to said path traversal vulnerability, however, an attacker with portal access could bypass the mentioned restrictions”, — point Jira Software developers.

The second bug, CVE-2019-15001, was detected in the Jira Importers (JIM) plugin and affects Jira Server and Jira Data Center products. Using the vulnerability, an attacker with administrator privileges Jira could inject a malicious template on the server side and, thus, remotely execute any code.

Read also: Attackers massively steal popular YouTube car channels

The list of vulnerable products Jira Service Desk Server and Jira Service Desk Data Center includes all assemblies of branches 3.9.x – 3.16.x and 4.0.x – 4.4.x. CVE-2019-14994 bug fixed in releases 3.9.16, 3.16.8, 4.1.3, 4.2.5, 4.3.4 and 4.4.1. If administrators cannot quickly install the patch, user can be protected from an attack by restricting access to Jira Software / Core projects and blocking certain requests to Jira – or by redirecting them to a reliable URL.

There is currently no data on the use of new vulnerabilities in cyberattacks.

Recommendations:

Vulnerabilities CVE-2019-15001 are affected by the Jira Server / Data Center branches 7.0.x – 7.13.x and 8.0.x – 8.3.x, as well as release 8.4.0. The problem is resolved by the release of updates 7.6.16, 7.13.8, 8.1.3, 8.2.5, 8.3.4 and 8.4.1, which are recommended to be installed immediately. As a temporary protection measure, you can prevent PUT requests from being sent to /rest/jira-importers-plugin/1.0/demo/create.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Remove Goheruds.xyz pop-up ads (Virus Removal Guide)

Goheruds.xyz is a site that tries to force you into subscribing to its browser notifications…

15 hours ago

Remove News-kezewe.cc pop-up ads (Virus Removal Guide)

News-kezewe.cc is a site that tries to trick you into subscribing to its browser notifications…

15 hours ago

Remove Recilopang.xyz pop-up ads (Virus Removal Guide)

Recilopang.xyz is a domain that tries to force you into subscribing to its browser notifications…

15 hours ago

Remove News-guyete.cc pop-up ads (Virus Removal Guide)

News-guyete.cc is a domain that tries to trick you into clik to its browser notifications…

15 hours ago

Remove Check-tl-ver-94-2 pop-up ads (Virus Removal Guide)

Check-tl-ver-94-2.com is a site that tries to trick you into subscribing to its browser notifications…

15 hours ago

Remove News-hubuja pop-up ads (Virus Removal Guide)

News-hubuja.com is a domain that tries to force you into subscribing to its browser notifications…

15 hours ago