Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0020 A number of vulnerabilities have been identified in Atlassian JIRA 27 February 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Atlassian JIRA Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Create Arbitrary Files -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade Member content until: Saturday, March 29 2014 OVERVIEW A number of vulnerabilities have been identified in Atlassian JIRA up to and including version 6.1.3. IMPACT The vendor has provided the following details regarding the issues: "Issue 1: Path traversal in JIRA Issue Collector plugin (Windows only) Severity Atlassian rates the severity level of this vulnerability as critical, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank the severity as critical, high, moderate or low. This is an independent assessment and you should evaluate its applicability to your own IT environment. Description We have identified and fixed a vulnerability in JIRA which allowed unauthenticated users to create files in any valid directory inside a JIRA install. In order to exploit this vulnerability, an attacker requires access to your JIRA web interface. This issue only affects JIRA servers running on Windows OS. It is not exploitable on Linux and OSX systems. The vulnerability affects all supported versions of JIRA up to and including 6.0.3. It has been fixed in 6.0.4. The issue is tracked in JRA-36442 - Path traversal in JIRA Issue Collector plugin (Windows only) RESOLVED. Our thanks to Philippe Arteau of Groupe Technologies Desjardins who reported this vulnerability." [1] "Issue 2: Path traversal in JIRA Importers plugin (Windows only) Severity Atlassian rates the severity level of this vulnerability as critical, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank the severity as critical, high, moderate or low. This is an independent assessment and you should evaluate its applicability to your own IT environment. Description We have identified and fixed a vulnerability in JIRA which allowed unauthenticated users to create files in any valid directory inside a JIRA install. In order to exploit this vulnerability, an attacker requires access to your JIRA web interface. This issue only affects JIRA servers running on Windows OS. It is not exploitable on Linux and OSX systems. The vulnerability affects all supported versions of JIRA up to and including 6.0.4. It has been fixed in 6.0.5. The issue is tracked in JRA-36441 - Path traversal in JIRA Importers plugin (Windows only) RESOLVED." [2] "Issue 3: Privilege escalation Severity Atlassian rates the severity level of this vulnerability as critical, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank the severity as critical, high, moderate or low. This is an independent assessment and you should evaluate its applicability to your own IT environment. Description We have identified and fixed a vulnerability in JIRA which allowed unauthenticated attackers to commit actions on behalf of any other authorised user. In order to exploit this vulnerability, an attacker requires access to your JIRA web interface. The vulnerability affects all supported versions of JIRA up to and including 6.1.3. It has been fixed in 6.1.4. The issue is tracked in JRA-35797 - Privilege escalation RESOLVED." [1] MITIGATION The vendor recommends updating to the latest version of JIRA to correct this vulnerability. REFERENCES [1] JIRA Security Advisory 2014-02-26 https://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2014-02-26 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUw7ejxLndAQH1ShLAQKcFQ/8CoUPVkSec23VJdlzD37VBn6c2kDnnhv2 Y0wrA9lo6TpbZR4GWla4KtOgP1W5iVXPvM+b6gm/sJ2u1kWj4tSDNjExcTDhQwyM yeEmCglngYsi2F5hflgNI1sYazt7o0zCCyVBLFNcNi4d++Uu/D9j8HmPp0jXz+XZ Sxp+qNem3rK1mbBOEvfnBoZCEHpr9s2w3HSm1ACIVs5fBh/uaMm+mGw5QHQUu5Zx 7oywz4ljK5zail8rrpE6EwXOD54Vn+0RDue9hxFgKZv10qpE0HTur0tKlVj97eCU 0A5JaiTKVrVyTjK4jpteUk0tUXpdZjP5S5ChsjoOkGD4cvcjJeY4Bo2Eg7zQkQWe xc6f9rZiaaV8pYebCNdcBTS+eIrdJschs5o7nqwUwY6Zdn4tFgJTzbmGlYTHuUTH NfyvdmIndmJkutnISMlF/SdQ9//UzWf+aGnKaJmT1aEJ5sLd2Rkh/Saty9NrfXvx bujIJYJHsEfp3fWoJvYNaF/8Wm2exoVJrQtSskhNmonzcy5pcUl1uM4Eh6/WDwon S5o3i0II/he/yxBTf4puuriE+wkStVtewF9qEtp/1O6WUUL8QzZlo/58hBHjvrtn uCIBjAKMqWlEAw6BMhNTaxqa2lG6qP4IRJGevhS9jhB5tlge1U0bFNFlDrtCMQs5 Y4uxy8lg/bw= =LUt8 -----END PGP SIGNATURE-----