NOTE: This bug report is for JIRA Server. Using JIRA Cloud? See the corresponding bug report.

      Somewhat hard to exploit but still doable when it comes to cache poisoning. Steps to reproduce:

      • Tamper with a GET request to http://<JIRA instance>/includes/decorators/global-translations.jsp with the Host header set to some XSS payload (e.g.
        <script>alert(/xss/)</script>
      • The offending lines in code pick this payload and browser renders it (observe an alert with text "xss")

      Offending code in /src/main/webapp/includes/decorators/global-translations.jsp#18:

      17      <input type="hidden" title="ajaxUnauthorised" value="<ww:text name="'common.forms.ajax.unauthorised.alert'"/>">
      18      <input type="hidden" title="baseURL" value="<%=request.getScheme() + "://" +request.getServerName() + ':' + request.getServerPort() + request.getContextPath()%>">
      19      <input type="hidden" title="ajaxCommsError" value="<ww:text name="'common.forms.ajax.commserror'"/>">
      

        1. Selection_109.png
          Selection_109.png
          14 kB
        2. Selection_110.png
          Selection_110.png
          32 kB

            [JRASERVER-61888] XSS in /includes/decorators/global-translations.jsp

            Bugfix Automation Bot made changes -
            Minimum Version New: 6
            Owen made changes -
            Workflow Original: JAC Bug Workflow v2 [ 2847092 ] New: JAC Bug Workflow v3 [ 2930876 ]
            Status Original: Resolved [ 5 ] New: Closed [ 6 ]
            Owen made changes -
            Symptom Severity Original: Minor [ 14432 ] New: Severity 3 - Minor [ 15832 ]
            Owen made changes -
            Workflow Original: JIRA Bug Workflow w Kanban v7 - Restricted [ 2587921 ] New: JAC Bug Workflow v2 [ 2847092 ]
            Ignat (Inactive) made changes -
            Workflow Original: JIRA Bug Workflow w Kanban v6 - Restricted [ 1580860 ] New: JIRA Bug Workflow w Kanban v7 - Restricted [ 2587921 ]
            Ignat (Inactive) made changes -
            Affects Version/s New:  Archived Cloud Version [ 77301 ]
            Affects Version/s Original: 1000.174.0 Cloud [ 62594 ]
            jonah (Inactive) made changes -
            Description Original: Somewhat hard to exploit but still doable when it comes to cache poisoning. Steps to reproduce:

            * Tamper with a GET request to {{http://&lt;JIRA instance>/includes/decorators/global-translations.jsp}} with the {{Host}} header set to some XSS payload (e.g. {code}<script>alert(/xss/)</script>{code}
            * The offending lines in code pick this payload and browser renders it (observe an alert with text "xss")

            Offending code in {{/src/main/webapp/includes/decorators/global-translations.jsp#18}}:

            {code:java}
            17 <input type="hidden" title="ajaxUnauthorised" value="<ww:text name="'common.forms.ajax.unauthorised.alert'"/>">
            18 <input type="hidden" title="baseURL" value="<%=request.getScheme() + "://" +request.getServerName() + ':' + request.getServerPort() + request.getContextPath()%>">
            19 <input type="hidden" title="ajaxCommsError" value="<ww:text name="'common.forms.ajax.commserror'"/>">
            {code}
            New: {panel:bgColor=#e7f4fa}
              *NOTE:* This bug report is for *JIRA Server*. Using *JIRA Cloud*? [See the corresponding bug report|http://jira.atlassian.com/browse/JRACLOUD-61888].
              {panel}

            Somewhat hard to exploit but still doable when it comes to cache poisoning. Steps to reproduce:

            * Tamper with a GET request to {{http://&lt;JIRA instance>/includes/decorators/global-translations.jsp}} with the {{Host}} header set to some XSS payload (e.g. {code}<script>alert(/xss/)</script>{code}
            * The offending lines in code pick this payload and browser renders it (observe an alert with text "xss")

            Offending code in {{/src/main/webapp/includes/decorators/global-translations.jsp#18}}:

            {code:java}
            17 <input type="hidden" title="ajaxUnauthorised" value="<ww:text name="'common.forms.ajax.unauthorised.alert'"/>">
            18 <input type="hidden" title="baseURL" value="<%=request.getScheme() + "://" +request.getServerName() + ':' + request.getServerPort() + request.getContextPath()%>">
            19 <input type="hidden" title="ajaxCommsError" value="<ww:text name="'common.forms.ajax.commserror'"/>">
            {code}
            jonah (Inactive) made changes -
            Link New: This issue relates to JRACLOUD-61888 [ JRACLOUD-61888 ]
            David Black made changes -
            Link New: This issue relates to JRA-22946 [ JRA-22946 ]
            David Black made changes -
            Affects Version/s New: 6.0 [ 29793 ]

              apawelczyk Artur Pawelczyk (Inactive)
              3fcb179f0169 Roberto dos Santos Soares
              Affected customers:
              0 This affects my team
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: