Public Security Vulnerability
Status: Published (View Workflow)
4.15.0, 4.15.1, 4.15.2, 4.16.1, 4.17.0, 4.16.0, 4.16.2, 4.17.1, 4.18.0, 4.19.0, 4.18.1, 4.18.2, 4.18.3, 4.19.1
Insight - Asset Management has a feature to import data from several databases (DBs). One of these DBs, the H2 DB, has a native function in its library which an attacker can use to run code on the server (remote code execution a.k.a. RCE). The H2 DB is bundled with Jira to help speed up the setup of Jira test environments.
The combination of the DB import feature introduced by Insight - Asset Management with the existing Jira H2 DB library exposed this vulnerability. The vulnerability exists whether or not the import configuration was saved and even if H2 was never used as a targeted DB. Accessing this vulnerability requires the following:
- The user must be an authenticated Jira user AND
Either of the following privileges within Insight - Asset Management:
- user or group permission to “Insight administrator”
- user or group permission to “Object Schema Manager”
The issue was discovered by l0gg via the Atlassian public bug bounty program.
|Insight - Asset Management version:
Jira Service Management Data Center and Server version:
- All 4.15.x versions
- All 4.16.x versions
- All 4.17.x versions
- All 4.18.x versions
- All 4.19.x versions|
Insight - Asset Management-8.9.3
Jira Service Management Data Center and Jira Service Management Server-4.20.0
Further details can be found on the advisory page.