-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0020
    A number of vulnerabilities have been identified in Atlassian JIRA
                             27 February 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Atlassian JIRA
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Create Arbitrary Files -- Remote/Unauthenticated
                      Unauthorised Access    -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
Member content until: Saturday, March 29 2014

OVERVIEW

        A number of vulnerabilities have been identified in Atlassian JIRA up
        to and including version 6.1.3.


IMPACT

        The vendor has provided the following details regarding the issues:
        
        "Issue 1: Path traversal in JIRA Issue Collector plugin (Windows only)
        
        Severity
        
        Atlassian rates the severity level of this vulnerability as critical, 
        according to the scale published in Severity Levels for Security 
        Issues. The scale allows us to rank the severity as critical, high, 
        moderate or low.
        
        This is an independent assessment and you should evaluate its 
        applicability to your own IT environment.
        
        Description
        We have identified and fixed a vulnerability in JIRA which allowed 
        unauthenticated users to create files in any valid directory inside a 
        JIRA install. In order to exploit this vulnerability, an attacker 
        requires access to your JIRA web interface.
        
        This issue only affects JIRA servers running on Windows OS. It is not 
        exploitable on Linux and OSX systems.
        
        The vulnerability affects all supported versions of JIRA up to and 
        including 6.0.3. It has been fixed in 6.0.4. The issue is tracked in 
        JRA-36442 - Path traversal in JIRA Issue Collector plugin (Windows only)
        RESOLVED.
        
        Our thanks to Philippe Arteau of Groupe Technologies Desjardins who 
        reported this vulnerability." [1]
        
        "Issue 2: Path traversal in JIRA Importers plugin (Windows only)
        
        Severity
        
        Atlassian rates the severity level of this vulnerability as critical, 
        according to the scale published in Severity Levels for Security 
        Issues. The scale allows us to rank the severity as critical, high, 
        moderate or low.
        
        This is an independent assessment and you should evaluate its 
        applicability to your own IT environment.
        
        Description
        We have identified and fixed a vulnerability in JIRA which allowed 
        unauthenticated users to create files in any valid directory inside a 
        JIRA install. In order to exploit this vulnerability, an attacker 
        requires access to your JIRA web interface.
        
        This issue only affects JIRA servers running on Windows OS. It is not 
        exploitable on Linux and OSX systems.
        
        The vulnerability affects all supported versions of JIRA up to and 
        including 6.0.4. It has been fixed in 6.0.5. The issue is tracked in  
        JRA-36441 - Path traversal in JIRA Importers plugin (Windows only) 
        RESOLVED." [2]
        
        "Issue 3: Privilege escalation
        
        Severity
        
        Atlassian rates the severity level of this vulnerability as critical, 
        according to the scale published in Severity Levels for Security 
        Issues. The scale allows us to rank the severity as critical, high, 
        moderate or low.
        
        This is an independent assessment and you should evaluate its 
        applicability to your own IT environment.
        
        Description
        
        We have identified and fixed a vulnerability in JIRA which allowed 
        unauthenticated attackers to commit actions on behalf of any other 
        authorised user. In order to exploit this vulnerability, an attacker 
        requires access to your JIRA web interface.
        
        The vulnerability affects all supported versions of JIRA up to and 
        including 6.1.3. It has been fixed in 6.1.4. The issue is tracked in  
        JRA-35797 - Privilege escalation RESOLVED." [1]


MITIGATION

        The vendor recommends updating to the latest version of JIRA to
        correct this vulnerability.


REFERENCES

        [1] JIRA Security Advisory 2014-02-26
            https://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2014-02-26

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUw7ejxLndAQH1ShLAQKcFQ/8CoUPVkSec23VJdlzD37VBn6c2kDnnhv2
Y0wrA9lo6TpbZR4GWla4KtOgP1W5iVXPvM+b6gm/sJ2u1kWj4tSDNjExcTDhQwyM
yeEmCglngYsi2F5hflgNI1sYazt7o0zCCyVBLFNcNi4d++Uu/D9j8HmPp0jXz+XZ
Sxp+qNem3rK1mbBOEvfnBoZCEHpr9s2w3HSm1ACIVs5fBh/uaMm+mGw5QHQUu5Zx
7oywz4ljK5zail8rrpE6EwXOD54Vn+0RDue9hxFgKZv10qpE0HTur0tKlVj97eCU
0A5JaiTKVrVyTjK4jpteUk0tUXpdZjP5S5ChsjoOkGD4cvcjJeY4Bo2Eg7zQkQWe
xc6f9rZiaaV8pYebCNdcBTS+eIrdJschs5o7nqwUwY6Zdn4tFgJTzbmGlYTHuUTH
NfyvdmIndmJkutnISMlF/SdQ9//UzWf+aGnKaJmT1aEJ5sLd2Rkh/Saty9NrfXvx
bujIJYJHsEfp3fWoJvYNaF/8Wm2exoVJrQtSskhNmonzcy5pcUl1uM4Eh6/WDwon
S5o3i0II/he/yxBTf4puuriE+wkStVtewF9qEtp/1O6WUUL8QzZlo/58hBHjvrtn
uCIBjAKMqWlEAw6BMhNTaxqa2lG6qP4IRJGevhS9jhB5tlge1U0bFNFlDrtCMQs5
Y4uxy8lg/bw=
=LUt8
-----END PGP SIGNATURE-----