QID 150487

Date Published: 2022-03-16

QID 150487: Atlassian Jira Server Multiple Vulnerabilities (JRASERVER-73071,JRASERVER-73138)

Jira is a proprietary issue tracking product, product developed by Atlassian. It provides bug tracking, issue tracking, and project management functions.

Multiple Vulnerabilities are identified in Atlassian Jira Server:
CVE-2021-43946 : The installed version of Jira Atlassian Server using the Jira Service Management addon allow remote attackers to add administrator groups to filter subscriptions via a Broken Access Control vulnerability in the /secure/EditSubscription.jspa endpoint.

CVE-2021-43952 : The installed version of Jira Atlassian Server using the Jira Service Management addon allow remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint.

Affected version:
before version 8.21.0

QID Detection Logic:(Unauthenticated)
It checks for vulnerable version of Atlassian Jira.

Successful exploitation of these vulnerabilities may allow remote attacker to impact the application's confidentiality, integrity and availability via Broken Authentication and Cross-Site Request Forgery (CSRF) vulnerability.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 4.3 severity.
  • Solution
    Customers are advised to refer to JRASERVER-73071, JRASERVER-73070 for updates pertaining to this vulnerability.

    CVEs related to QID 150487

    Software Advisories
    Advisory ID Software Component Link
    JRASERVER-73071 URL Logo jira.atlassian.com/browse/JRASERVER-73071
    JRASERVER-73138 URL Logo jira.atlassian.com/browse/JRASERVER-73138