QID 730168

Date Published: 2021-08-31

QID 730168: Atlassian Jira Server And Data Center Multiple Security Vulnerabilities (JRASERVER-72669, JRASERVER-72575, JRASERVER-72597)

Jira is a proprietary issue tracking product, developed by Atlassian. It provides bug tracking, issue tracking, and project management functions.

CVE-2021-29505: Atlassian Jira Server and Data Center uses the vulnerable version of XStream that is affected with this CVE.
CVE-2021-39120: Atlassian Jira Server and Data Center allow remote attackers to learn when a restricted comment is removed from an issue via an information disclosure vulnerability in the comment notification functionality.
CVE-2021-39117: Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the Custom Fields creation feature on the AssociateFieldToScreens page.

Affected version:
Atlassian Jira Server and Data Center version prior to 8.18.0

NOTE:
CVE-2021-29505 affects JRASERVER-72669, CVE-2021-39120 affects JRASERVER-72575 and CVE-2021-39117 affects JRASERVER-72597.

QID Detection Logic:(Unauthenticated)
It checks for vulnerable version of Atlassian Jira.

Successful exploitation of this vulnerability may affect the confidentiality, integrity and availability of the targeted user.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Customers are advised to refer to JRASERVER-72669, JRASERVER-72575 and JRASERVER-72597 for updates pertaining to this vulnerability.

    CVEs related to QID 730168

    Software Advisories
    Advisory ID Software Component Link
    JRASERVER-72575 URL Logo jira.atlassian.com/browse/JRASERVER-72575
    JRASERVER-72597 URL Logo jira.atlassian.com/browse/JRASERVER-72597
    JRASERVER-72669 URL Logo jira.atlassian.com/browse/JRASERVER-72669