• 7.2
    • High
    • CVE-2021-43947

      Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to execute arbitrary code via a Remote Code Execution (RCE) vulnerability in the Email Templates feature.

      This issue bypasses the fix of https://jira.atlassian.com/browse/JSDSERVER-8665.

      This issue was discovered by tuo4n8 from RedTeam@VNG Corporation.

      The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.

      Affected versions:

      • version < 8.13.15
      • 8.14.0 ≤ version < 8.20.3

      Fixed versions:

      • 8.13.15
      • 8.20.3
      • 8.21.0

            [JRASERVER-73067] Email Template Injection to RCE - CVE-2021-43947

            JIRATFS added a comment -

            how Can Fix This Problem?

            JIRATFS added a comment - how Can Fix This Problem?

            Keith Schug added a comment - - edited

            Is this still an issue in version 8.20.10?

            Keith Schug added a comment - - edited Is this still an issue in version 8.20.10?

            We upgraded Jira to 8.20.2 recently and wanted to avoid another upgrade in short term.. is there any workaround to fix this?

            Ravi Karanam added a comment - We upgraded Jira to 8.20.2 recently and wanted to avoid another upgrade in short term.. is there any workaround to fix this?

            Eric Gasior added a comment - - edited

            X

            Eric Gasior added a comment - - edited X

            We have upgraded our Jira in 8.13.17 version and still showing this vulnerability on our Jira instance server.

            So, this vulnerability is yet not resolved.

            Also, please suggest, how can we secure our instance from this vulnerability, is there any patch/dark feature is required to add?

            Please look into this on priority. 

            Regards,

            Amit

            Amit Srivastava added a comment - We have upgraded our Jira in 8.13.17 version and still showing this vulnerability on our Jira instance server. So, this vulnerability is yet not resolved. Also, please suggest, how can we secure our instance from this vulnerability, is there any patch/dark feature is required to add? Please look into this on priority.  Regards, Amit

            Why cant you guys make a secure product.  These security vulnerabilities are causing us to have to upgrade Jira every month.

            lance_lyons added a comment - Why cant you guys make a secure product.  These security vulnerabilities are causing us to have to upgrade Jira every month.

            Matthew Hope added a comment - - edited

            It seems that this vulnerability is being reported elsewhere as CRITICAL not high (with a CVSS score of 9) - https://www.cvedetails.com/cve/CVE-2021-43947/

            Is Atlassian happy to stand by the CVSS score reported here of 7.2?

            EDIT: it seems the cvedetails score is based on the CVSS v2 scoring criteria

            Matthew Hope added a comment - - edited It seems that this vulnerability is being reported elsewhere as CRITICAL not high (with a CVSS score of 9) - https://www.cvedetails.com/cve/CVE-2021-43947/ Is Atlassian happy to stand by the CVSS score reported here of 7.2? EDIT: it seems the cvedetails score is based on the CVSS v2 scoring criteria

            AB added a comment - - edited

            This is an independent assessment and you should evaluate its applicability to your own IT environment.

            CVSS v3 score: 7.2 => High severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity Low
            Privileges Required High
            User Interaction None

            Scope Metric

            Scope Unchanged

            Impact Metrics

            Confidentiality High
            Integrity High
            Availability High

            https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

            AB added a comment - - edited This is an independent assessment and you should evaluate its applicability to your own IT environment. CVSS v3 score: 7.2 => High severity Exploitability Metrics Attack Vector Network Attack Complexity Low Privileges Required High User Interaction None Scope Metric Scope Unchanged Impact Metrics Confidentiality High Integrity High Availability High https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              27 Start watching this issue

                Created:
                Updated:
                Resolved: