NOTE: This bug report is for JIRA Server. Using JIRA Cloud? See the corresponding bug report.

      Jira Admins can create a persistant XSS on the Incoming Mail configuration page.

      When the value

      "><script>alert(1)</script> 
      

      is inserted into the Witelisted Domain field on the page

      /secure/admin/IncomingMailServers.jspa
      

      The javascript persists and executes on page load.

      This was tested on Jira version v7.1.9#71013-sha1:1aa0586

            [JRASERVER-61963] XSS in Mail Whitelist Field

            CVSS v3 score: 4.8 => Medium severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity Low
            Privileges Required High
            User Interaction Required

            Scope Metric

            Scope Changed

            Impact Metrics

            Confidentiality Low
            Integrity Low
            Availability None

            See http://go.atlassian.com/cvss for more details.

            Alek Amrani (Inactive) added a comment - CVSS v3 score: 4.8 => Medium severity Exploitability Metrics Attack Vector Network Attack Complexity Low Privileges Required High User Interaction Required Scope Metric Scope Changed Impact Metrics Confidentiality Low Integrity Low Availability None See http://go.atlassian.com/cvss for more details.

              Unassigned Unassigned
              aamrani Alek Amrani (Inactive)
              Affected customers:
              0 This affects my team
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: