QID 731035

Date Published: 2023-12-27

QID 731035: Atlassian Data Center and Server Remote Code Execution (RCE) Vulnerabilities (JSWSERVER-24756)

Multiple Atlassian Data Center and Server Products use the SnakeYAML library for Java, which is susceptible to a deserialization flaw that can lead to RCE (Remote Code Execution).

Affected Versions:
(Jira Core Data Center and Server) and (Jira Software Data Center and Server) versions 9.4.0,9.4.1,9.4.2,9.4.3,9.4.4,,9.4.5,9.4.6,9.4.7,9.4.8,9.4.9,9.4.10,9.4.11,9.4.12,9.5.x,9.6.x,9.7.x,9.8.x,9.9.x,9.10.x,9.11.0,9.11.1
Note: Detection is practice check because we cannot detect Universal Plugin Manager (UPM) and Automation for Jira (A4J) app at this point.

QID detection Logic: (Unauthenticated)
The QID sends a HTTP GET request to secure/Dashboard.jspa to check the vulnerable version of the products.

Successful exploitation of this vulnerability may lead to Remote Code Execution (RCE) Vulnerability, which may aid further attacks.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.4 severity.
  • Solution
    Customers are advised to refer to JSWSERVER-24756 for updates pertaining to this vulnerability.
    Workaround:
    If you are unable to upgrade your product instance to a fixed version, you can completely mitigate this vulnerability by upgrading your Automation for Jira (A4J) app to a fixed version via the Universal Plugin Manager (UPM).
    Vendor References

    CVEs related to QID 731035

    Software Advisories
    Advisory ID Software Component Link
    JSWSERVER-24756 URL Logo jira.atlassian.com/browse/JSWSERVER-24756