A Bugcrowd researcher Daniil Dmitriev uncovered a critical vulnerability in version 4.4.0 of Jira Server and Jira Data Center.
What is the vulnerability?
The server-side template injection vulnerability tracked as CVE-2019-11581 allows an attacker to launch arbitrary code execution and completely take over the application data and functionality. This vulnerability could allow an attacker to inject malicious input in the template enabling potential execution.
The critical vulnerability in the ContactAdministrators and the SendBulkMail actions could be exploited when the following conditions are met.
If the Contact Administrators Form is enabled, the vulnerability could be exploited without the need for authentication.
“All versions of Jira Server and Data Center from 4.4.0 before 7.6.14 (the fixed version for 7.6.x), from 7.7.0 before 7.13.5 (the fixed version for 7.13.x), from 8.0.0 before 8.0.3 (the fixed version for 8.0.x), from 8.1.0 before 8.1.2 (the fixed version for 8.1.x), and from 8.2.0 before 8.2.3 are affected by this vulnerability,” the advisory read.
Patches for the vulnerability
Atlassian has patched the critical vulnerability in versions 8.2.3, 8.1.2, 8.0.3, 7.13.5, and 7.6.14. Atlassian has also provided temporary mitigations, which include:
Publisher