-
Bug
-
Resolution: Fixed
-
High (View bug fix roadmap)
-
9.0.0, 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0, 8.20.18
-
8.2
-
7.5
-
Severity 2 - Major
-
Affected versions of Atlassian Jira Server and Data Centre allowed an unauthenticated remote attacker to fetch Issue,Project and Sprint information via Information Disclosure Vulnerability via "/secure/QueryComponentRendererValue!Default.jspa" endpoint.
Affected versions:
- version < 9.5.1
Fixed versions:
- 8.20.21 and newer
- 9.4.4 and newer
- 9.5.1 and newer
- 9.6.0 and newer
[JRASERVER-74771] Information Disclosure via QueryCompenentRenderer API
Introduced in Version | New: 8.2 |
Symptom Severity | New: Severity 2 - Major [ 15831 ] | |
Workflow | Original: JAC Public Security Vulnerability Workflow v2 [ 4341798 ] | New: JAC Bug Workflow v3 [ 4510126 ] |
Issue Type | Original: Public Security Vulnerability [ 10700 ] | New: Bug [ 1 ] |
Status | Original: Published [ 12873 ] | New: Closed [ 6 ] |
Link | New: This issue has a derivative of JRASERVER-76261 [ JRASERVER-76261 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 765126 ] |
Description |
Original:
Affected versions of Atlassian Jira Server and Data Centre allowed an unauthenticated remote attacker to fetch Issue,Project and Sprint information via Information Disclosure Vulnerability via "/secure/QueryComponentRendererValue!Default.jspa" endpoint.
*Affected versions:* * version < 9.5.1 *Fixed versions:* * 9.5.1 * 9.6.0 |
New:
Affected versions of Atlassian Jira Server and Data Centre allowed an unauthenticated remote attacker to fetch Issue,Project and Sprint information via Information Disclosure Vulnerability via "/secure/QueryComponentRendererValue!Default.jspa" endpoint.
*Affected versions:* * version < 9.5.1 *Fixed versions:* * 8.20.21 and newer * 9.4.4 and newer * 9.5.1 and newer * 9.6.0 and newer |
Having been previously bitten by
JRASERVER-71536(/secure/QueryComponent.jspa), I setup a forced authentication rule with Resolution SSO for SAML, and forced auth on all endpoints /secure/*. Looks like that rule came in handy here as I missed the annoucement for this vuln. Highly recommend especially if you are already using it.