-
Type:
Bug
-
Resolution: Fixed
-
Priority:
Medium
-
Affects Version/s: 7.13.0, 8.5.0, 8.12.0
-
Component/s: Login
-
7.13
-
9
-
Severity 1 - Critical
-
14
-
Putting credentials in request parameters is likely to lead to those credentials being logged in access logs.
Â
Workaround
The following workaround is available in Jira 8.0.0 and higher versions.
If you wish to prevent users from authenticating using url parameters, specifying their username & password in url parameters, then
1. Stop Jira
2. Open <Jira-installation-directory>/WEB-INF/web.xml
3. Search for `<param-name>allowUrlParameterValue</param-name>`
4. Modify `<param-value>true</param-value>` to <param-value>false</param-value>
5. Start Jira.
Note prior to making this change we suggest checking your Jira log files for log events like the following
User "example-user" authenticated using os_password as a query parameter, this means of authentication has been deprecated.
- causes
-
JRACLOUD-65287 The the os_username parameter has been blocked but it is still used in the users onboarding notifications
-
- Closed
-
- is related to
-
JRASERVER-67979 Deprecate support for authenticating using os_username, os_password as url query parameters
-
- Closed
-
- relates to
-
SER-199 Make support for os_username and os_password as url parameters require opting in
-
- RESOLVED
-
-
PC-12399 Loading...
-
SECINT-6993 Loading...
-
JSEV-1370 Loading...
- has action
-
RM-11292 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...