-
Bug
-
Resolution: Fixed
-
Highest (View bug fix roadmap)
-
None
-
None
NOTE: This bug report is for JIRA Server. Using JIRA Cloud? See the corresponding bug report.
We have identified and fixed a vulnerability in JIRA which allowed unauthenticated attackers to commit actions on behalf of any other authorised user. In order to exploit this vulnerability, an attacker requires access to JIRA web interface.
The vulnerability affects all supported versions of JIRA up to and including 6.1.3. It has been fixed in 6.1.4.
For more information, see our security advisory.
Patches are available at
JIRA 4.4.5: http://downloads.atlassian.com/software/jira/downloads/patch/patch-JRA-35797-4.4.5-20140303.zip
JIRA 5.0.7: http://downloads.atlassian.com/software/jira/downloads/patch/patch-JRA-35797-5.0.7-20140303.zip
JIRA 5.1.8: http://downloads.atlassian.com/software/jira/downloads/patch/patch-JRA-35797-5.1.8.zip
JIRA 5.2.11: http://downloads.atlassian.com/software/jira/downloads/patch/patch-JRA-35797-5.2.11-20140303.zip
JIRA 6.0.8: http://downloads.atlassian.com/software/jira/downloads/patch/patch-JRA-35797-6.0.8.zip
- relates to
-
JRACLOUD-35797 Privilege escalation
-
- Closed
-
- was cloned as
-
CONFSERVER-31628 Privilege escalation
-
- Closed
-
- is cloned from
-
TRUST-36 Failed to load
Form Name |
---|
Dear JIRA Administrator,
This was a discovery by an internal team, not an external report or a real incident in the wild. As you can see from the list of affected versions, this vulnerability existed for years. We do not have any indications of it ever having been exploited in the wild - it is a very complex issue. At the same time, a perfectly executed attack using this vulnerability would not leave any trace.
Regards,
Vitaly Osipov
Security Engineering