Uploaded image for project: 'Jira Software Data Center'
  1. Jira Software Data Center
  2. JSWSERVER-26303

Path Traversal (Arbitrary Read/Write) org.springframework:spring-webmvc Dependency in Jira Software Data Center and Server

    • 7.5
    • High
    • CVE-2024-38819
    • Atlassian (Internal)
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    • Path Traversal (Arbitrary Read/Write)
    • Jira Software Data Center, Jira Software Server

      This High severity org.springframework:spring-webmvc Dependency vulnerability was introduced in versions 9.12.0 Jira Software Data Center and Server.

      This org.springframework:spring-webmvc Dependency vulnerability, with a CVSS Score of 7.5 and a CVSS Vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N allows an attacker to craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.

      Atlassian recommends that Jira Software Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:

      • Jira Software Data Center and Server 9.12: Upgrade to a release greater than or equal to 9.12.18

      See the release notes (https://www.atlassian.com/software/jira/download-archives). You can download the latest version of Jira Software Data Center and Server from the download center (https://www.atlassian.com/software/jira/download-archives).

      The National Vulnerability Database provides the following description for this vulnerability: Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.

            [JSWSERVER-26303] Path Traversal (Arbitrary Read/Write) org.springframework:spring-webmvc Dependency in Jira Software Data Center and Server

            Green Bone added a comment -

            It seems there are also once again inconsistencies in the affected and fixed versions:

            https://confluence.atlassian.com/security/security-bulletin-march-18-2025-1527943363.html

            This lists these as affected:

            10.4.0 to 10.4.1
            10.3.0 to 10.3.3 (LTS)
            10.2.0 to 10.2.1
            10.1.1 to 10.1.2
            10.0.0 to 10.0.1
            9.17.0 to 9.17.5
            9.16.0 to 9.16.1
            9.15.2
            9.14.0 to 9.14.1
            9.13.0 to 9.13.1
            9.12.0 to 9.12.18 (LTS)
            9.11.0 to 9.11.3
            9.10.0 to 9.10.2
            9.9.0 to 9.9.2
            9.8.0 to 9.8.2
            9.7.0 to 9.7.2

            and these as fixed:

            10.5.0 Data Center Only
            10.3.4 (LTS) recommended Data Center Only
            9.12.19 (LTS)

            while the issue here is only listing 9.12.x as affected and 9.12.18 as the fixed versions.

            Green Bone added a comment - It seems there are also once again inconsistencies in the affected and fixed versions: https://confluence.atlassian.com/security/security-bulletin-march-18-2025-1527943363.html This lists these as affected: 10.4.0 to 10.4.1 10.3.0 to 10.3.3 (LTS) 10.2.0 to 10.2.1 10.1.1 to 10.1.2 10.0.0 to 10.0.1 9.17.0 to 9.17.5 9.16.0 to 9.16.1 9.15.2 9.14.0 to 9.14.1 9.13.0 to 9.13.1 9.12.0 to 9.12.18 (LTS) 9.11.0 to 9.11.3 9.10.0 to 9.10.2 9.9.0 to 9.9.2 9.8.0 to 9.8.2 9.7.0 to 9.7.2 and these as fixed: 10.5.0 Data Center Only 10.3.4 (LTS) recommended Data Center Only 9.12.19 (LTS) while the issue here is only listing 9.12.x as affected and 9.12.18 as the fixed versions.

            Frank Hess added a comment -

            From my perspective I don't understand why Atlassian isn't adding adding hints like mentioned by c82fd2df9d0a. By reading the ticket the first time, reader gets the impression that any logged in user could access files like dbconfig.xml/server.xml with potentially security relevant informations by path traversal. This isn't the first time such information would be helpful. The same was e.g. with the Februray security bulletin CVE-2024-50379 for Confluence which was reading really bad and after checking that the readonly property is set by default Confluence wasn't affected by the exploit.
             

            Frank Hess added a comment - From my perspective I don't understand why Atlassian isn't adding adding hints like mentioned by c82fd2df9d0a . By reading the ticket the first time, reader gets the impression that any logged in user could access files like dbconfig.xml/server.xml with potentially security relevant informations by path traversal. This isn't the first time such information would be helpful. The same was e.g. with the Februray security bulletin CVE-2024-50379 for Confluence which was reading really bad and after checking that the readonly property is set by default Confluence wasn't affected by the exploit.  

            Brik, Oussama added a comment -

            c82fd2df9d0a  thanks for the link, by the way, it seems there is a small issue with the URL: CVE-2024-38819: Path traversal vulnerability in functional web frameworks (2nd report)

            Brik, Oussama added a comment - c82fd2df9d0a   thanks for the link, by the way, it seems there is a small issue with the URL: CVE-2024-38819: Path traversal vulnerability in functional web frameworks (2nd report)

            Ravi G added a comment -

            Spring.io says following. So, if Jira is hosted on default Tomcat then it is not affected by this.  Please clarify.

             

            "Malicious requests are blocked and rejected when any of the following is true:

            Ravi G added a comment - Spring.io says following. So, if Jira is hosted on default Tomcat then it is not affected by this.  Please clarify.   "Malicious requests are blocked and rejected when any of the following is true: the  Spring Security HTTP Firewall  is in use the application runs on Tomcat or Jetty"

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              9 Start watching this issue

                Created:
                Updated:
                Resolved: