Uploaded image for project: 'Jira Service Management Data Center'
  1. Jira Service Management Data Center
  2. JSDSERVER-6517

URL Path Traversal in Jira Service Desk Server and Jira Service Desk Data Center Allows Information Disclosure - CVE-2019-14994

    • Icon: Bug Bug
    • Resolution: Fixed
    • Icon: Low Low
    • 4.1.3, 3.9.16, 4.4.1, 4.2.5, 4.3.4, 3.16.8
    • 1.0, (157)
      1.0.3, 1.0.4, 1.1, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.2, 1.2.0.1, 1.2.0.2, 1.2.1, 1.2.4, 1.2.4.1, 1.2.5, 1.2.6, 1.2.6.1, 1.2.7, 2.0, 2.0.1, 2.0.2, 2.0.4, 2.0.3, 2.1, 2.1.1, 2.1.2, 2.2, 2.2.1, 2.3, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.3.6, 2.4.1, 2.4.2, 2.4.3, 2.5.0, 2.5.2, 2.5.3, 2.5.4, 2.5.6, 3.0.0, 3.1.0, 2.5.8, 3.0.2, 2.5.9, 3.0.4, 3.0.5, 3.0.9, 3.0.10, 3.1.1, 3.1.2, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, 3.2.6, 3.2.7, 3.2.8, 3.2.9, 3.2.11, 3.2.10, 3.2.12, 3.2.13, 3.2.14, 3.2.15, 3.3.0, 3.3.1, 3.3.2, 3.4.0, 3.4.1, 3.4.2, 3.5.0, 3.5.1, 3.5.2, 3.5.3, 3.6.0, 3.6.1, 3.6.2, 3.6.4, 3.7.0, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.9.0, 3.9.1, 3.9.2, 3.9.3, 3.9.4, 3.9.6, 3.9.7, 3.9.8, 3.9.9, 3.9.10, 3.9.11, 3.10.0, 3.10.1, 3.10.2, 3.10.4, 3.11.0, 3.11.1, 3.11.2, 3.11.4, 3.12.0, 3.12.2, 3.13.0, 3.13.1, 3.13.2, 3.14.0, 3.14.1, 3.14.2, 3.15.0, 3.15.1, 3.15.2, 3.15.3, 3.16.0, 3.16.1, 4.0.0, 3.9.12, 3.16.2, 4.0.2, 4.1.0, 4.0.3, 3.9.13, 3.16.3, 4.1.1, 4.2.0, 3.16.4, 4.1.2, 3.9.14, 4.3.0, 4.2.1, 4.4.0, 4.2.2, 3.16.5, 4.2.3, 4.3.1, 3.16.6, 4.1.3, 3.9.15, 4.2.4, 4.3.2, 4.3.3
    • Customer Portal

      A URL path traversal vulnerability in Jira Service Desk Server and Jira Service Desk Data Center allows a remote attacker with portal access to view all issues from all projects in the affected instance. This could include Jira Service Desk projects, Jira Core projects, and Jira Software projects. Note that when the Anyone can email the service desk or raise a request in the portal setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability.

      Affected Versions

      • All versions prior to 3.9.16
      • Versions from 3.10.0 prior to 3.16.8
      • Versions from 4.0.0 prior to 4.1.3
      • Versions from 4.2.0 prior to 4.2.5
      • Versions from 4.3.0 prior to 4.3.4
      • Version 4.4.0

      Workaround

      • Block requests to Jira containing .. at the reverse proxy or load balancer level
      • Alternatively, configure Jira to redirect requests containing .. to a safe URL via urlrewrite.xml
        • Please see Jira KB for workaround details
      • Restart Jira

      Refer to the Jira KB for more information on these workarounds.

      Fix

      Note: Upgrading Jira Service Desk also requires upgrading Jira Core. Check the compatibility matrix to find the equivalent version for your Jira Service Desk version.

      For additional details, see the full advisory.

            [JSDSERVER-6517] URL Path Traversal in Jira Service Desk Server and Jira Service Desk Data Center Allows Information Disclosure - CVE-2019-14994

            I have removed the workaround in this bug's detail as it is out of date. Please see Jira KB for workaround detail

            Alex [Atlassian,PSE] added a comment - I have removed the workaround in this bug's detail as it is out of date. Please see Jira KB for workaround detail
            Alex [Atlassian,PSE] made changes -
            Description Original: A URL path traversal vulnerability in Jira Service Desk Server and Jira Service Desk Data Center allows a remote attacker with portal access to view all issues from all projects in the affected instance. This could include Jira Service Desk projects, Jira Core projects, and Jira Software projects. Note that when the [*Anyone can email the service desk or raise a request in the portal* setting|https://confluence.atlassian.com/servicedeskserver/managing-access-to-your-service-desk-939926273.html] is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability.
            h3. Affected Versions
             * All versions prior to 3.9.16
             * Versions from 3.10.0 prior to 3.16.8
             * Versions from 4.0.0 prior to 4.1.3
             * Versions from 4.2.0 prior to 4.2.5
             * Versions from 4.3.0 prior to 4.3.4
             * Version 4.4.0

            h3. Workaround
             * Block requests to Jira containing {{..}} at the reverse proxy or load balancer level
             * Alternatively, configure Jira to redirect requests containing {{..}} to a safe URL 
             ** Add the following to the {{<urlrewrite>}} section of
             {{[jira-installation-directory]/atlassian-jira/WEB-INF/urlrewrite.xml}}:
            {noformat}
              <rule>
                    <from>^/[^?]*\.\..*$</from>
                    <to type="temporary-redirect">/</to>
              </rule>{noformat}

             * [Restart Jira|https://confluence.atlassian.com/adminjiraserver/start-and-stop-jira-applications-938847802.html]

            Refer to the [Jira KB|https://confluence.atlassian.com/jirakb/migating-url-path-traversal-for-affected-cve-2019-14994-976762572.html] for more information on these workarounds.

            h3. Fix

            *Note:* Upgrading Jira Service Desk also requires upgrading Jira Core. Check the [compatibility matrix|https://confluence.atlassian.com/adminjira/jira-applications-compatibility-matrix-875304597.html] to find the equivalent version for your Jira Service Desk version.
             * 4.4.1 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 4.3.4 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 4.2.5 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 4.1.3 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 3.16.8 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 3.9.16 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].

            For additional details, see the [full advisory|https://confluence.atlassian.com/jira/jira-service-desk-security-advisory-2019-09-11-976171274.html].
            New: A URL path traversal vulnerability in Jira Service Desk Server and Jira Service Desk Data Center allows a remote attacker with portal access to view all issues from all projects in the affected instance. This could include Jira Service Desk projects, Jira Core projects, and Jira Software projects. Note that when the [*Anyone can email the service desk or raise a request in the portal* setting|https://confluence.atlassian.com/servicedeskserver/managing-access-to-your-service-desk-939926273.html] is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability.
            h3. Affected Versions
             * All versions prior to 3.9.16
             * Versions from 3.10.0 prior to 3.16.8
             * Versions from 4.0.0 prior to 4.1.3
             * Versions from 4.2.0 prior to 4.2.5
             * Versions from 4.3.0 prior to 4.3.4
             * Version 4.4.0

            h3. Workaround
             * Block requests to Jira containing {{..}} at the reverse proxy or load balancer level
             * Alternatively, configure Jira to redirect requests containing {{..}} to a safe URL via {{urlrewrite.xml}}
             ** Please see [Jira KB|https://confluence.atlassian.com/jirakb/migating-url-path-traversal-for-affected-cve-2019-14994-976762572.html] for workaround details
             * [Restart Jira|https://confluence.atlassian.com/adminjiraserver/start-and-stop-jira-applications-938847802.html]

            Refer to the [Jira KB|https://confluence.atlassian.com/jirakb/migating-url-path-traversal-for-affected-cve-2019-14994-976762572.html] for more information on these workarounds.
            h3. Fix

            *Note:* Upgrading Jira Service Desk also requires upgrading Jira Core. Check the [compatibility matrix|https://confluence.atlassian.com/adminjira/jira-applications-compatibility-matrix-875304597.html] to find the equivalent version for your Jira Service Desk version.
             * 4.4.1 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 4.3.4 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 4.2.5 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 4.1.3 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 3.16.8 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].
             * 3.9.16 which is available for download from [https://www.atlassian.com/software/jira/service-desk/update].

            For additional details, see the [full advisory|https://confluence.atlassian.com/jira/jira-service-desk-security-advisory-2019-09-11-976171274.html].
            Alex [Atlassian,PSE] made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 544490 ]
            David Black made changes -
            Labels Original: CVE-2019-14994 advisory advisory-to-release bugbounty cvss-high improper-authorization security New: CVE-2019-14994 advisory advisory-released bugbounty cvss-high improper-authorization security
            set-jac-bot made changes -
            Sven Laanela (Inactive) made changes -
            Affects Version/s Original: 3.12.3 [ 80701 ]
            Sven Laanela (Inactive) made changes -
            Affects Version/s Original: 3.11.3 [ 85596 ]
            Sven Laanela (Inactive) made changes -
            Affects Version/s Original: 4.0.4 [ 88099 ]
            Said made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 471321 ]
            Aidan Goldthorpe made changes -
            Labels Original: CVE-2019-14994 advisory advisory-to-release bugbounty cvss-high security New: CVE-2019-14994 advisory advisory-to-release bugbounty cvss-high improper-authorization security

              Unassigned Unassigned
              badeloye@atlassian.com Brian Adeloye (Inactive)
              Affected customers:
              1 This affects my team
              Watchers:
              10 Start watching this issue

                Created:
                Updated:
                Resolved: