CVE-2019-11581:Atlassian Jira 伺服器與資料中心存在重大範本插入弱點
Vulnerability introduced nearly eight years ago could lead to remote code execution on vulnerable Jira Server and Data Center systems.
背景說明
On July 10, Atlassian published Security Advisory 2019-07-10 to address a critical vulnerability in Jira Server and Jira Data Center. Jira Server manages and controls Atlassian’s Jira ticketing system, while Jira Data Center allows administrators to manage business-wide management and scalability of Jira Servers.
分析
CVE-2019-11581 is a server-side template injection vulnerability in “various resources” of Jira Server and Data Center. According to the advisory, the vulnerability was introduced in version 4.4.0, which was released in August 2011, making this vulnerability nearly eight years old.
The template injection vulnerability exists within the ContactAdministrators and SendBulkMail actions in Jira Server and Data Center. However, in order to exploit the vulnerability, an SMTP server needs to be configured, and either the Contact Administrators Form needs to be enabled (unauthenticated attack), or the attacker has “JIRA Administrators” access (authenticated attack). Exploitation of this vulnerability would grant an attacker the ability to remotely execute code on the vulnerable Jira system.
概念驗證
At the time of publishing, there was no proof of concept (PoC) available. However, similar to what transpired following the Atlassian advisory for the Confluence Widget Connector vulnerabilities (CVE-2019-3395, CVE-2019-3396) in March 2019, we anticipate that PoCs will emerge in the near future.
解決方法
As noted in the Analysis section, CVE-2019-11581 was introduced in Jira Server and Data Center version 4.4.0. The patched versions that address this vulnerability include 8.0.3, 8.1.2, 8.2.3 and Enterprise releases 7.6.14 and 7.13.5. The following table lists the vulnerable versions and associated fixed versions.
Affected Version | Fixed Version |
---|---|
4.4.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
5.x.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
6.x.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.0.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.1.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.2.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.3.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.4.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.5.x | 7.6.14, 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.6.x before 7.6.14 | 7.6.14, 7.13.5 (Enterprise Releases) |
7.7.x | 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.8.x | 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.9.x | 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.10.x | 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.11.x | 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.12.x | 7.13.5, 8.0.3, 8.1.2, 8.2.3 |
7.13.x before 7.13.5 | 7.13.5 (Enterprise Release) |
8.0.x before 8.0.3 | 8.0.3 |
8.1.x before 8.1.2 | 8.1.2 |
8.2.x before 8.2.3 | 8.2.3 |
Atlassian also advises that customers who have installed Jira Service Desk version 3.0.0 before 4.2.3 may also be affected by this vulnerability. They have provided a compatibility matrix to help identify whether or not the Jira Service Desk version is affected.
Atlassian also notes that Jira Cloud customers are not affected by this vulnerability.
If upgrading to a patched version of Jira Server or Data Center is not currently feasible, Atlassian recommends the following temporary workarounds:
- First, disable the Contact Administrators Form
- Second, block access to the /secure/admin/SendBulkMail!default.jspa endpoint
找出受影響的系統
A list of Tenable plugins to identify this vulnerability will appear here as they’re released.
Additionally, Atlassian has provided a support document to help identify if an attacker has compromised a Jira instance using CVE-2019-11851.
取得更多資訊
加入 Tenable Community 的 Tenable 安全回應團隊。
深入瞭解 Tenable,這是用於全面管理新型攻擊破綻的首創 Cyber Exposure 平台。
Get a free 60-day trial of Tenable.io.
相關文章
- Threat Intelligence
- Threat Management
- Vulnerability Management
- Vulnerability Scanning