Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-62496

CVE-2016-6668 - The HipChat plugin for various products leaks the secret key it uses to communicate with a linked HipChat instance.

      The HipChat for JIRA plugin exposed the secret key it used to communicate with a linked HipChat service in various pages. For this vulnerability to affect your JIRA instance you must have a HipChat integration established. To exploit this issue in JIRA versions 7.0.0 and higher, attackers need to have access to a JIRA account. In JIRA versions before 7.0.0, such as 6.4.x, attackers only need access to the JIRA web interface. Using the secret key attackers can gain full control over a linked HipChat instance.


      Affected versions:

      • All versions of HipChat for JIRA plugin from 6.26.0 before 7.8.17 are affected by this vulnerability.
      • All versions of JIRA from 6.4.8 before 7.0.11(the fixed version for 7.0.x) and from 7.1.0 before 7.1.10 (the fixed version for 7.1.x) are affected by this vulnerability are affected by this vulnerability.


      Fix:


      Risk Mitigation:

      • If you are unable to upgrade your JIRA server or the HipChat for JIRA plugin, then as a temporary workaround, you can disable or uninstall the HipChat for JIRA plugin in JIRA.


      For additional details see the full advisory.

            [JRASERVER-62496] CVE-2016-6668 - The HipChat plugin for various products leaks the secret key it uses to communicate with a linked HipChat instance.

            David Black made changes -
            Labels Original: CVE-2016-6668 advisory affects-server cvss-critical security New: CVE-2016-6668 advisory affects-server cvss-critical information-disclosure security
            Bugfix Automation Bot made changes -
            Minimum Version New: 6.04
            Owen made changes -
            Workflow Original: JAC Bug Workflow v2 [ 2830385 ] New: JAC Bug Workflow v3 [ 2929666 ]
            Status Original: Resolved [ 5 ] New: Closed [ 6 ]
            Owen made changes -
            Symptom Severity Original: Critical [ 14430 ] New: Severity 1 - Critical [ 15830 ]
            Owen made changes -
            Workflow Original: JIRA Bug Workflow w Kanban v7 - Restricted [ 2579227 ] New: JAC Bug Workflow v2 [ 2830385 ]
            Status Original: Closed [ 6 ] New: Resolved [ 5 ]
            Kamil Kolonko made changes -
            Fix Version/s New: 7.1.10 [ 64204 ]
            Fix Version/s Original: 7.1.10 Server [ 63302 ]
            Ignat (Inactive) made changes -
            Workflow Original: JIRA Bug Workflow w Kanban v6 - Restricted [ 1596972 ] New: JIRA Bug Workflow w Kanban v7 - Restricted [ 2579227 ]
            Confluence Escalation Bot (Inactive) made changes -
            Labels Original: CVE-2016-6668 advisory cvss-critical security New: CVE-2016-6668 advisory affects-server cvss-critical security
            David Black made changes -
            Comment [ A comment with security level 'atlassian-staff' was removed. ]
            David Black made changes -
            Security Original: Reporter and Atlassian Staff [ 10751 ]

              Unassigned Unassigned
              dblack David Black
              Affected customers:
              0 This affects my team
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: