The JIRA/Crowd applications fail to properly sanitize user input in the query string of the website or in the value of a parameter

XMLWordPrintable

    • Type: Suggestion
    • Resolution: Invalid
    • None
    • Component/s: None
    • Environment:

      NOTE: This suggestion is for JIRA Server. Using JIRA Cloud? See the corresponding suggestion.

      We need to avoid Cross-site Scripting vulnerabilities. A function should be created to provide server side and client side input validation where applicable. Special characters should be stripped out during the validation process.
      The following special characters should be stripped out if unnecessary:
      [1] | (pipe sign)
      [2] & (ampersand sign)
      [3] ; (semicolon sign)
      [4] $ (dollar sign)
      [5] % (percent sign)
      [6] @ (at sign)
      [7] ' (single apostrophe)
      [8] " (quotation mark)
      [9] \' (backslash-escaped apostrophe)
      [10] \" (backslash-escaped quotation mark)
      [11] <> (triangular parenthesis)
      [12] () (parenthesis)
      [13] + (plus sign)
      [14] CR (Carriage return, ASCII 0x0d)
      [15] LF (Line feed, ASCII 0x0a)
      [16] , (comma sign)
      [17] \ (backslash)

      During testing, we found following urls to reproduce the Cross-site scripting (XSS) vulnerabilities.

      https://del-test.sapient.resultspace.com/jira/rest/api/1.0/labels/suggest

      Vulnerable Parameters: query, suggest

      https://del-test.sapient.resultspace.com/jira/rest/gadget/1.0/createdVsResolved/generate

      Vulnerable Parameters : projectOrFilterId

      https://del-test.sapient.resultspace.com/jira/rest/gadget/1.0/createdVsResolved/validate

      Vulnerable Parameters: projectOrFilterId, validate

      https://deltest.sapient.resultspace.com/jira/rest/greenhopper/1.0/context-list/generate

      Vulnerable Parameters: projectId,generate

      https://deltest.sapient.resultspace.com/jira/rest/greenhopper/1.0/versionBoardlist/generate

      Vulnerable Parameters: projectId, generate

      Please find the attachment Cross_Site_Scripting.txt file for details in response.

            Assignee:
            Unassigned
            Reporter:
            Reetesh Kumar
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: