Rapid7 Vulnerability & Exploit Database

JIRA Security Advisory 2019-07-10: Jira Server - Template injection in various resources

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

JIRA Security Advisory 2019-07-10: Jira Server - Template injection in various resources

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/10/2019
Created
07/13/2019
Added
07/12/2019
Modified
05/03/2022

Description

There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. For this issue to be exploitable at least one of the following conditions must be met (an SMTP server has been configured in Jira and the Contact Administrators Form is enabled; or an SMTP server has been configured in Jira and an attacker has "JIRA Administrators" access.) In the first case, where the Contact Administrators Form is enabled, attackers are able to exploit this issue without authentication. In the second case, attackers with "JIRA Administrators" access can exploit this issue. In either case, successful exploitation of this issue allows an attacker to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center.

Solution(s)

  • atlassian-jira-upgrade-7_13_5
  • atlassian-jira-upgrade-7_6_14
  • atlassian-jira-upgrade-8_0_3
  • atlassian-jira-upgrade-8_1_2
  • atlassian-jira-upgrade-8_2_3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;