Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-73170

CSRF allows toggling Thread Contention and CPU Monitoring - CVE-2021-43953

    • 3
    • Low
    • CVE-2021-43953

      Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to toggle the Thread Contention and CPU monitoring settings via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/ViewInstrumentation.jspa endpoint.

      The affected versions are before version 8.13.16, and from version 8.14.0 before 8.20.5.

      Affected versions:

      • version < 8.13.16
      • 8.14.0 <= version < 8.20.5

      Fixed versions:

      • 8.13.16
      • 8.20.5
      • 8.21.0

            [JRASERVER-73170] CSRF allows toggling Thread Contention and CPU Monitoring - CVE-2021-43953

            The published CVE needs to be adjusted as well.

            Kevin Lange added a comment - The published CVE needs to be adjusted as well.

            @Christoph Monig: In fact, I assume it is a cumulative fix, but I want to make sure.

            At least the Fix Version/s should be updated.

            Beate Hübner added a comment - @Christoph Monig: In fact, I assume it is a cumulative fix, but I want to make sure. At least the Fix Version/s should be updated.

            @Beate Hübner I would assume it does, since they had fixed it in 8.20.5. They would not reintroduce the problem in the subsequent version. But they could be clearer and explicitly list "<8.20.5" under "Affected versions".

            Christoph Monig added a comment - @Beate Hübner I would assume it does, since they had fixed it in 8.20.5. They would not reintroduce the problem in the subsequent version. But they could be clearer and explicitly list "<8.20.5" under "Affected versions".

            Does also Version 8.20.6 fix this issue?

            Beate Hübner added a comment - Does also Version 8.20.6 fix this issue?

            I opened a support ticket to get info about when to expect the fix in LTS releases and turns out the fix was already released in 8.20.5 and 8.13.16, but they failed to mentioned it in this ticket. I see the "Fix Versions" info in this ticket is now updated accordingly. I was also told there are no workarounds at the moment, so upgrade is the way to go.

            José Pablo Hernández added a comment - I opened a support ticket to get info about when to expect the fix in LTS releases and turns out the fix was already released in 8.20.5 and 8.13.16, but they failed to mentioned it in this ticket. I see the "Fix Versions" info in this ticket is now updated accordingly. I was also told there are no workarounds at the moment, so upgrade is the way to go.

            8.21 is not a LTS.

            Why there is no backported fix for LTS?

            Sinan Yildirim added a comment - 8.21 is not a LTS. Why there is no backported fix for LTS?

            at least some information regarding the LTS releases would be appreciated ...

            klaus zerwes added a comment - at least some information regarding the LTS releases would be appreciated ...

            Can this be mitigated by blocking the /secure/admin/ViewInstrumentation.jspa endpoint in either an application firewall or reverse proxy?

            Christoph Monig added a comment - Can this be mitigated by blocking the /secure/admin/ViewInstrumentation.jspa endpoint in either an application firewall or reverse proxy?

            Will there also be an upgrade for 8.13.x LTS release?

            Michael Vils added a comment - Will there also be an upgrade for 8.13.x LTS release?

            Is this patch going to make it to a 8.20.x LTS release?

            Alex Johnson added a comment - Is this patch going to make it to a 8.20.x LTS release?

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              14 Start watching this issue

                Created:
                Updated:
                Resolved: