We couldn't load all Actvitity tabs. Refresh the page to try again.
If the problem persists, contact your Jira admin.
IMPORTANT: JAC is a Public system and anyone on the internet will be able to view the data in the created JAC tickets. Please don’t include Customer or Sensitive data in the JAC ticket.
Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-78128

Vulnerability in the filter manager - Anonymous users can access popular filters w/out permission

      A vulnerability has been detected in the filter manager, in the 'Popular' section, it has been seen that users can see the popular filters, without having previous permissions in that filter or in the project.

      In itself, they can not see the content of the filter as such, or the commands that make it up, but they can see the description, the owner, among others.

      My question is, if this can be solved in some way, such as disabling the Popular section in the filter manager, or if this vulnerability will be solved in the future.

      Users cannot see the issues themselves (in this example) but can view the filter name, owner, and popularity. Without logging in a subset of our filters are visible here: <base url>/secure/ManageFilters.jspa#filterView=popular

      Our permissions do not allow any anonymous access to the projects mentioned in these filters. The filters are shared with everyone. If this is not a bug can you please describe the functionality of anonymous access to filters so that we can configure JIRA correctly to prevent this data leakage. (It appears that filters shared with Everyone can be seen anonymously even if the issues contained within cannot.)

            Loading...
            IMPORTANT: JAC is a Public system and anyone on the internet will be able to view the data in the created JAC tickets. Please don’t include Customer or Sensitive data in the JAC ticket.
            Uploaded image for project: 'Jira Data Center'
            1. Jira Data Center
            2. JRASERVER-78128

            Vulnerability in the filter manager - Anonymous users can access popular filters w/out permission

              • Icon: Bug Bug
              • Resolution: Unresolved
              • Icon: Low Low
              • None
              • None
              • None

                A vulnerability has been detected in the filter manager, in the 'Popular' section, it has been seen that users can see the popular filters, without having previous permissions in that filter or in the project.

                In itself, they can not see the content of the filter as such, or the commands that make it up, but they can see the description, the owner, among others.

                My question is, if this can be solved in some way, such as disabling the Popular section in the filter manager, or if this vulnerability will be solved in the future.

                Users cannot see the issues themselves (in this example) but can view the filter name, owner, and popularity. Without logging in a subset of our filters are visible here: <base url>/secure/ManageFilters.jspa#filterView=popular

                Our permissions do not allow any anonymous access to the projects mentioned in these filters. The filters are shared with everyone. If this is not a bug can you please describe the functionality of anonymous access to filters so that we can configure JIRA correctly to prevent this data leakage. (It appears that filters shared with Everyone can be seen anonymously even if the issues contained within cannot.)

                        Unassigned Unassigned
                        c3678a055509 Leonardo Souto
                        Votes:
                        0 Vote for this issue
                        Watchers:
                        1 Start watching this issue

                          Created:
                          Updated:

                            Unassigned Unassigned
                            c3678a055509 Leonardo Souto
                            Affected customers:
                            0 This affects my team
                            Watchers:
                            1 Start watching this issue

                              Created:
                              Updated: