QID 731296

Date Published: 2024-04-01

QID 731296: Atlassian Jira Software Data Center and Server Remote Code Execution (RCE) Vulnerability (JSWSERVER-25800)

Jira is a proprietary issue tracking product, developed by Atlassian. It provides bug tracking, issue tracking, and project management functions.

Affected Versions:
Atlassian Jira Software versions v9.11.0 to v9.11.3
Atlassian Jira Software versions v9.10.0 to v9.10.2
Atlassian Jira Software versions v9.9.0 to v9.9.2
Atlassian Jira Software versions v9.8.0 to v9.8.2
Atlassian Jira Software versions v9.7.0 to v9.7.2
Atlassian Jira Software versions v9.6.0
Atlassian Jira Software versions v9.5.0 to v9.5.1
Atlassian Jira Software versions v9.4.0 to v9.4.15
Atlassian Jira Software versions v9.3.0 to v9.3.3
Atlassian Jira Software versions v9.2.0 to v9.2.1
Atlassian Jira Software versions v9.1.0 to v9.1.1
Atlassian Jira Software versions v9.0.0
Atlassian Jira Software versions v8.22.x
Atlassian Jira Software versions v8.20.x

QID detection Logic: (Unauthenticated)
The QID sends a HTTP GET request to secure/Dashboard.jspa to check the vulnerable version of the products.

Successful exploitation of this vulnerability allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, no impact to integrity, no impact to availability, and requires no user interaction leading to executions of remote code.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to update to Jira Software Data Center, Jira Software Server versions 9.12.5, 9.8.0, 9.4.16 or later. For further information, please refer to JSWSERVER-25800 security advisory.
    Vendor References

    CVEs related to QID 731296

    Software Advisories
    Advisory ID Software Component Link
    JSWSERVER-25800 URL Logo jira.atlassian.com/browse/JSWSERVER-25800