Please be aware that Atlassian does not consider this issue to represent a security risk as the functionality is restricted to users with administrative rights.

      Issue Summary

      When adding a Jira server in Bamboo under the "User directories" module, an attacker can put any value in the "Server URL" field and the response from the server is returned to the client. Yes, it's true that if an attacker already had admin on a Bamboo instance, they can do a whole lot more damaging things, but this effectively allows them to scan the internal network that the Bamboo instance is sitting on and determine what other endpoints they can exploit. This vulnerability is especially useful if an attacker does not have a shell on the host and has just popped the Bamboo we app.

      Steps to Reproduce

      1. Login to Admin user
      2. Navigate to Bamboo administration (11.png)
      3. Click on User directories (22.png)
      4. Click on Add Directory (33.png)
      5. Select Directory type to JIRA (44.png)
      6. Enter Server URL as http://127.0.0.1:8000 (55.png)
      7. Click on test settings (66.png)
      8. Observe the request to server (77.png)
      9. Message for open port 80 (88.png)
      10. Message for non http open port (92.png)
      11. Message for Closed port (94.png)

        1. 11.png
          11.png
          152 kB
        2. 22.png
          22.png
          151 kB
        3. 33.png
          33.png
          135 kB
        4. 44.png
          44.png
          138 kB
        5. 55.png
          55.png
          108 kB
        6. 66.png
          66.png
          103 kB
        7. 77.png
          77.png
          103 kB
        8. 88.png
          88.png
          81 kB
        9. 92.png
          92.png
          47 kB
        10. 94.png
          94.png
          50 kB

            [CWD-5522] SSRF when adding Jira server in admin plugin

            Apologies team. There was a miscommunication on the security team and we're going to close this out since it requires admin privileges. Thanks!

            Ethan Gregory Dodge (Inactive) added a comment - Apologies team. There was a miscommunication on the security team and we're going to close this out since it requires admin privileges. Thanks!

            CVSS v3 score: 4.9 => Medium severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity Low
            Privileges Required High
            User Interaction None

            Scope Metric

            Scope Unchanged

            Impact Metrics

            Confidentiality High
            Integrity None
            Availability None

            See http://go.atlassian.com/cvss for more details.

            https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

            Ethan Gregory Dodge (Inactive) added a comment - CVSS v3 score: 4.9 => Medium severity Exploitability Metrics Attack Vector Network Attack Complexity Low Privileges Required High User Interaction None Scope Metric Scope Unchanged Impact Metrics Confidentiality High Integrity None Availability None See http://go.atlassian.com/cvss for more details. https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

              Unassigned Unassigned
              edodge Ethan Gregory Dodge (Inactive)
              Affected customers:
              0 This affects my team
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: