Lucene search

K
atlassianSecurity-metrics-botJRASERVER-69532
HistoryJun 26, 2019 - 5:27 a.m.

CVE-2019-11581 - Template injection in various resources

2019-06-2605:27:16
security-metrics-bot
jira.atlassian.com
24

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.973 High

EPSS

Percentile

99.9%

There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. For this issue to be exploitable at least one of the following conditions must be met:

  • an SMTP server has been configured in Jira and the Contact Administrators Form is enabled; or
  • an SMTP server has been configured in Jira and an attacker has “JIRA Administrators” access.

In the first case, where the Contact Administrators Form is enabled, attackers are able to exploit this issue without authentication. In the second case, attackers with “JIRA Administrators” access can exploit this issue. In either case, successful exploitation of this issue allows an attacker to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center.

Affected versions:

  • All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.

Fix:
We have released the following versions of Jira Server & Jira Data Center to address this issue:

For additional details, see the [full advisory|https://confluence.atlassian.com/x/AzoGOg].

Affected configurations

Vulners
Node
atlassianjira_data_centerRange4.4
OR
atlassianjira_data_centerRange7.1.0
OR
atlassianjira_data_centerRange7.2.0
OR
atlassianjira_data_centerRange7.3.0
OR
atlassianjira_data_centerRange7.4.0
OR
atlassianjira_data_centerRange7.5.0
OR
atlassianjira_data_centerRange7.6.0
OR
atlassianjira_data_centerRange7.7.0
OR
atlassianjira_data_centerRange7.0.0
OR
atlassianjira_data_centerRange7.8.0
OR
atlassianjira_data_centerRange7.9.0
OR
atlassianjira_data_centerRange7.10.0
OR
atlassianjira_data_centerRange7.11.0
OR
atlassianjira_data_centerRange7.12.0
OR
atlassianjira_data_centerRange7.13.0
OR
atlassianjira_data_centerRange7.13.1
OR
atlassianjira_data_centerRange8.1.0
OR
atlassianjira_data_centerRange8.2.0
OR
atlassianjira_data_centerRange<8.0.3
OR
atlassianjira_data_centerRange<7.6.14
OR
atlassianjira_data_centerRange<8.1.2
OR
atlassianjira_data_centerRange<8.3.0
OR
atlassianjira_data_centerRange<8.2.3
OR
atlassianjira_data_centerRange<7.13.5

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.973 High

EPSS

Percentile

99.9%