-
Bug
-
Resolution: Deployed
-
Highest (View bug fix roadmap)
-
3.13.5, 4.0.2, 4.1.2, 4.2
-
None
-
3.13
-
We have identified and fixed vulnerabilities in JIRA 4.2 which will allow an attacker to invoke XSS (Cross Site Scripting) attacks and/or Cross Site Request Forgery (XSRF) attacks. Full details of the severity, risks and vulnerabilities can be found in the JIRA Security Advisory 2010-11-06.
The patches below should be applied. Please note that all Studio instances are not vulnerable at the time of this disclosure.
Note these patches are cumulative and include the fixes that were applied in JRA-21004,
Patches
Version | File |
---|---|
3.13.5 | patch-JRA-22493-3.13.5.zip |
4.0.2 | patch-JRA-22493-4.0.2.zip |
4.1.2 | patch-JRA-22493-4.1.2.zip |
4.2 | patch-JRA22493-4.2.zip |
- was cloned as
-
JRASERVER-22545 Source Patches for XSS/XSRF vulnerabilities
-
- Closed
-
Running an unzip across my Jira instances is both clunky and breaks the rpm I build to deploy and manage my Jira install. I can probably wangle a %patch in the specfile, but surely it would have been just as easy to roll an updated tar.gz of the Jira standalone install bundle? This kind f ad-hoc patching is not what I'd expect of Atlassian.