-
Bug
-
Resolution: Fixed
-
Medium (View bug fix roadmap)
-
7.13.0, 8.5.0, 8.12.0
-
7.13
-
9
-
Severity 1 - Critical
-
14
-
-
Putting credentials in request parameters is likely to lead to those credentials being logged in access logs.
Workaround
The following workaround is available in Jira 8.0.0 and higher versions.
If you wish to prevent users from authenticating using url parameters, specifying their username & password in url parameters, then
1. Stop Jira
2. Open <Jira-installation-directory>/WEB-INF/web.xml
3. Search for `<param-name>allowUrlParameterValue</param-name>`
4. Modify `<param-value>true</param-value>` to <param-value>false</param-value>
5. Start Jira.
Note prior to making this change we suggest checking your Jira log files for log events like the following
User "example-user" authenticated using os_password as a query parameter, this means of authentication has been deprecated.
- causes
-
JRACLOUD-65287 The the os_username parameter has been blocked but it is still used in the users onboarding notifications
-
- Closed
-
- is related to
-
JRASERVER-67979 Deprecate support for authenticating using os_username, os_password as url query parameters
-
- Closed
-
- relates to
-
SER-199 Make support for os_username and os_password as url parameters require opting in
-
- RESOLVED
-
-
PC-12399 Failed to load
-
SECINT-6993 Failed to load
-
JSEV-1370 Loading...
- has action
-
RM-11292 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
Since it has the 'security' label, this ticket has been imported into Vulnerability Funnel as: https://asecurityteam.atlassian.net/browse/VULN-197103
The issue will be triaged by the Product Security team and if it is determined to be a security vulnerability, it will need to be completed prior to the assigned security SLO due date.
For more information on how Atlassian handles security vulnerabilities, see the Security Vulnerabilities - User Guide
To avoid duplicate issues, please do not remove the 'security-imported' label from this issue.