• 4
    • 2
    • We collect Jira feedback from various sources, and we evaluate what we've collected when planning our product roadmap. To understand how this piece of feedback will be reviewed, see our Implementation of New Features Policy.

      The files related to the Jackson-databind library used by JIRA are out of date.. While JIRA does not employ methodology which would enable exploitation of these old vulnerabilities(detailed in CVE-2017-15095), the problem is with the vulnerable files existing on the file system at all. They can trigger false positives against vulnerability scans.

      The following library files are affected

      <JIRA_HOME>\plugins\.osgi-plugins\felix\felix-cache\bundle130\version0.0\atlassian-remote-event-common-plugin-1.0.12-D20170127T113645.jar-embedded\META-INF\lib\jackson-annotations-2.3.0.jar
      <JIRA_HOME>\plugins\.osgi-plugins\felix\felix-cache\bundle130\version0.0\atlassian-remote-event-common-plugin-1.0.12-D20170127T113645.jar-embedded\META-INF\lib\jackson-core-2.3.2.jar
      <JIRA_HOME>\plugins\.osgi-plugins\felix\felix-cache\bundle130\version0.0\atlassian-remote-event-common-plugin-1.0.12-D20170127T113645.jar-embedded\META-INF\lib\jackson-databind-2.3.2.jar
      <JIRA_HOME>\plugins\.osgi-plugins\felix\felix-cache\bundle150\version0.0\jackson-module-scala-2.10-provider-plugin-0.5.jar-embedded\jackson-module-scala-2.10-1.9.3.3.jar
      <JIRA_HOME>\plugins\.osgi-plugins\felix\felix-cache\bundle34\version0.0\atlassian-gadgets-directory-plugin-4.2.21.jar-embedded\META-INF\lib\jackson-core-asl-1.4.4.jar
      <JIRA_HOME>\plugins\.osgi-plugins\felix\felix-cache\bundle34\version0.0\atlassian-gadgets-directory-plugin-4.2.21.jar-embedded\META-INF\lib\jackson-mapper-asl-1.4.3.jar
      <JIRA_INSTALL>\atlassian-jira\WEB-INF\atlassian-bundled-plugins\jackson-module-scala-2.10-provider-plugin-0.5.jar
      <JIRA_INSTALL>\atlassian-jira\WEB-INF\lib\jackson-1.0.jar
      <JIRA_INSTALL>\atlassian-jira\WEB-INF\lib\jackson-core-asl-1.9.13-atlassian-1.jar
      <JIRA_INSTALL>\atlassian-jira\WEB-INF\lib\jackson-mapper-asl-1.9.13-atlassian-1.jar

          Form Name

            [JRASERVER-71535] Update jackson-databind library bundled with JIRA

            AB added a comment - - edited

            Hi,

            This issue is now patched in versions 8.13.1, 8.14.0, and 8.5.10.

            AB added a comment - - edited Hi, This issue is now patched in versions 8.13.1, 8.14.0, and 8.5.10.

            AB added a comment -

            Hi dc2568792d03, I've identified the problem as coming from a particular plugin dependency in Jira Core; the plugin version likely needs to be upgraded. I'll sort out the plugin and keep you posted.

            AB added a comment - Hi dc2568792d03 , I've identified the problem as coming from a particular plugin dependency in Jira Core; the plugin version likely needs to be upgraded. I'll sort out the plugin and keep you posted.

            the JSD image includes jackson-databind 2.3.2 here:

            /opt/atlassian/jira/atlassian-jira/WEB-INF/atlassian-bundled-plugins/atlassian-remote-event-common-plugin-6.1.0.jar:META-INF/lib/jackson-databind-2.3.2.jar

            David Ramos added a comment - the JSD image includes jackson-databind 2.3.2 here: /opt/atlassian/jira/atlassian-jira/WEB-INF/atlassian-bundled-plugins/atlassian-remote-event-common-plugin-6.1.0.jar:META-INF/lib/jackson-databind-2.3.2.jar

            org.codehaus.jackson:jackson-mapper-asl is still in the POM of https://packages.atlassian.com/maven-external/com/atlassian/jira/jira-project/8.12.1/ and thus it is used to compile every plugin using the official Plugin SDK. This is NOT a Jira Service Desk only thing.

            Stefan Glase added a comment - org.codehaus.jackson:jackson-mapper-asl is still in the POM of https://packages.atlassian.com/maven-external/com/atlassian/jira/jira-project/8.12.1/  and thus it is used to compile every plugin using the official Plugin SDK. This is NOT a Jira Service Desk only thing.

            AB added a comment - - edited

            dc2568792d03 Thanks for letting me know! I've moved the ticket into JSDSERVER so we can get it sorted.

            I've just checked on our jackson-databind versions used in Jira Server itself (the core application), and those are all up-to-date:


            🟦 = Doesn't appear in our scan of the latest version of Jira Server.

            CVE-2020-8840: 🟦, resolved on 24 Jun 2020.
            CVE-2019-20330: 🟦, resolved on 24 Jun 2020.
            CVE-2019-17531: 🟦, resolved on 15 Dec 2019.
            CVE-2019-17267: 🟦, resolved on 15 Dec 2019.
            CVE-2019-16943: 🟦, resolved on 15 Dec 2019.
            CVE-2019-16942: 🟦, resolved on 15 Dec 2019.
            CVE-2019-16335: 🟦, resolved on 15 Dec 2019.
            CVE-2019-14540: 🟦, resolved on 15 Dec 2019.
            CVE-2018-7489: 🟦, resolved on 22 Sep 2019.
            CVE-2018-14718: 🟦, resolved on 22 Sep 2019.
            CVE-2018-11307: 🟦, resolved on 22 Sep 2019.
            CVE-2018-5968: 🟦, resolved on 22 Sep 2019.
            CVE-2017-17485: 🟦, resolved on 22 Sep 2019.
            CVE-2017-15095: 🟦, resolved on 22 Sep 2019.


            So the issue might be coming from Service Desk (rather than the core application). I'll check the scans for Service Desk and write back to you.

             

            AB added a comment - - edited dc2568792d03  Thanks for letting me know! I've moved the ticket into JSDSERVER so we can get it sorted. I've just checked on our jackson-databind versions used in Jira Server itself (the core application), and those are all up-to-date: 🟦 = Doesn't appear in our scan of the latest version of Jira Server. CVE-2020-8840: 🟦, resolved on 24 Jun 2020. CVE-2019-20330: 🟦, resolved on 24 Jun 2020. CVE-2019-17531: 🟦, resolved on 15 Dec 2019. CVE-2019-17267: 🟦, resolved on 15 Dec 2019. CVE-2019-16943: 🟦, resolved on 15 Dec 2019. CVE-2019-16942: 🟦, resolved on 15 Dec 2019. CVE-2019-16335: 🟦, resolved on 15 Dec 2019. CVE-2019-14540: 🟦, resolved on 15 Dec 2019. CVE-2018-7489: 🟦, resolved on 22 Sep 2019. CVE-2018-14718: 🟦, resolved on 22 Sep 2019. CVE-2018-11307: 🟦, resolved on 22 Sep 2019. CVE-2018-5968: 🟦, resolved on 22 Sep 2019. CVE-2017-17485: 🟦, resolved on 22 Sep 2019. CVE-2017-15095: 🟦, resolved on 22 Sep 2019. So the issue might be coming from Service Desk (rather than the core application). I'll check the scans for Service Desk and write back to you.  

            @Anton 🆎: we're scanning (and using) the Docker image atlassian/jira-servicedesk:4.12.0, which I realize is Jira Service Desk and not Jira Server, but the vulnerabilities are in jackson-databind 2.3.2, which is the version bundled with both Jira Server and JSD. I suspect much of the code may be shared between the two products, but please let me know if I should report a separate ticket specifically for JSD.

            David Ramos added a comment - @Anton 🆎: we're scanning (and using) the Docker image  atlassian/jira-servicedesk:4.12.0 , which I realize is Jira Service Desk and not Jira Server, but the vulnerabilities are in jackson-databind 2.3.2 , which is the version bundled with both Jira Server and JSD. I suspect much of the code may be shared between the two products, but please let me know if I should report a separate ticket specifically for JSD.

            AB added a comment - - edited

            Hi dc2568792d03, may I ask what version of Jira Server you're scanning?

            AB added a comment - - edited Hi dc2568792d03 , may I ask what version of Jira Server you're scanning?

            btw, most of the CVEs we're seeing are newer than when this issue was opened in 2017, so it's entirely possible that the newer ones may be exploitable even if the original issues were not.

            issues our tool is flagging:

            • CVE-2020-8840
            • CVE-2019-20330
            • CVE-2019-17531
            • CVE-2019-17267
            • CVE-2019-16943
            • CVE-2019-16942
            • CVE-2019-16335
            • CVE-2019-14540
            • CVE-2018-7489
            • CVE-2018-14718
            • CVE-2018-11307
            • CVE-2018-5968
            • CVE-2017-17485
            • CVE-2017-15095

            David Ramos added a comment - btw, most of the CVEs we're seeing are newer than when this issue was opened in 2017, so it's entirely possible that the newer ones may be exploitable even if the original issues were not. issues our tool is flagging: CVE-2020-8840 CVE-2019-20330 CVE-2019-17531 CVE-2019-17267 CVE-2019-16943 CVE-2019-16942 CVE-2019-16335 CVE-2019-14540 CVE-2018-7489 CVE-2018-14718 CVE-2018-11307 CVE-2018-5968 CVE-2017-17485 CVE-2017-15095

            we're seeing at least 14 distinct known vulnerabilities being flagged in jackson-databind 2.3.2. as Atlassian customers, we don't have visibility into whether any of these vulns are exploitable based on how Jira/Jira Service Desk are using the library.

            overall, it's quite concerning to see a deserialization library in use that has so many known vulnerabilities, given the troubling history of deserialization libraries causing security incidents. this version is over 6 years old, and none of this is acceptable for an enterprise product that is widely used in security-critical ways.

            please patch your software.

            more broadly, you should not be relying on upvotes from customers to get you to patch your vulnerable third party dependencies.

            David Ramos added a comment - we're seeing at least 14 distinct known vulnerabilities being flagged in jackson-databind  2.3.2. as Atlassian customers, we don't have visibility into whether any of these vulns are exploitable based on how Jira/Jira Service Desk are using the library. overall, it's quite concerning to see a deserialization library in use that has so many known vulnerabilities, given the troubling history of deserialization libraries causing security incidents. this version is over 6 years old, and none of this is acceptable for an enterprise product that is widely used in security-critical ways. please patch your software. more broadly, you should not be relying on upvotes from customers to get you to patch your vulnerable third party dependencies.

            Stefan Glase added a comment - - edited

            As a plugin developer I do not want to depend directly or indirectly on a library that comes with a potential security vulnerability. Atlassian selling me the Data Center Bug Bounty Program while at the same time ignoring known security flaws makes no sense to me. Please fix that dependency in one of the upcoming versions.

            The latest released jira-project POM (see https://packages.atlassian.com/maven-external/com/atlassian/jira/jira-project/8.9.0/) still references an affected version.

            Stefan Glase added a comment - - edited As a plugin developer I do not want to depend directly or indirectly on a library that comes with a potential security vulnerability. Atlassian selling me the Data Center Bug Bounty Program while at the same time ignoring known security flaws makes no sense to me. Please fix that dependency in one of the upcoming versions. The latest released jira-project POM (see  https://packages.atlassian.com/maven-external/com/atlassian/jira/jira-project/8.9.0/ ) still references an affected version.

              ablack@atlassian.com AB
              sseaver Shaun S
              Votes:
              11 Vote for this issue
              Watchers:
              15 Start watching this issue

                Created:
                Updated:
                Resolved: