Path traversal in Jira Service Management Server - CVE-2019-15004

 

Path traversal in Jira Service Management Server - CVE-2019-15004

Published: November 7, 2019


Vulnerability identifier: #VU22573
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2019-15004
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Atlassian
Affected software:
Jira Service Management Server

Detailed vulnerability description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the Customer Context Filter. A remote attacker with portal access can send a specially crafted HTTP request and view all issues within all Jira projects contained in the vulnerable instance. This could include Jira Service Desk projects, Jira Core projects, and Jira Software projects.

Note: Attacker can grant themselves access to Jira Service Desk portals that have the "Anyone can email the service desk or raise a request in the portal" setting enabled.


How to mitigate CVE-2019-15004

Install updates from vendor's website.

Sources