Jira Service Desk Security Advisory 2019-09-18

Jira Service Desk Server and Jira Service Desk Data Center - URL path traversal allows information disclosure - CVE-2019-14994

Summary

CVE-2019-14994 - URL path traversal allows information disclosure

Advisory Release Date

 10:00 AM PDT (Pacific Time, -7 hours)

Product

Jira Service Desk Server and Jira Service Desk Data Center

This does not affect Jira Service Desk Cloud.

This does not affect Jira Core or Jira Software on instances where Jira Service Desk is not installed.

Affected Jira Service Desk Server and
Jira Service Desk Data Center Versions

  • version < 3.9.16
  • 3.10.0 <= version < 3.16.8
  • 4.0.0 <= version < 4.1.3
  • 4.2.0 <= version < 4.2.5
  • 4.3.0 <= version < 4.3.4
  • 4.4.0 <= version < 4.4.1
Click here to expand...
  • All versions before 3.9.16
  • 3.10.x
  • 3.11.x
  • 3.12.x
  • 3.13.x
  • 3.14.x
  • 3.15.x
  • 3.16.x before 3.16.8 (the fixed version for 3.16.x)
  • 4.0.x
  • 4.1.x before 4.1.3 (the fixed version for 4.1.x)
  • 4.2.x before 4.2.5 (the fixed version for 4.2.x)
  • 4.3.x before 4.3.4 (the fixed version for 4.3.x)
  • 4.4.x before 4.4.1 (the fixed version for 4.4.x)

Fixed Jira Service Desk Versions

  • 3.9.16
  • 3.16.8
  • 4.1.3
  • 4.2.5
  • 4.3.4
  • 4.4.1


CVE ID(s)CVE-2019-14994

Summary of Vulnerability

This advisory discloses a critical severity security vulnerability in Jira Service Desk Server and Jira Service Desk Data Center. Versions before 3.9.16, from 3.10.0 before 3.16.8, from 4.0.0 before 4.1.3, from 4.2.0 before 4.2.5, from 4.3.0 before 4.3.4, and version 4.4.0 are affected by this vulnerability. 

Atlassian Cloud instances have already been upgraded to a version of Jira Service Desk which does not have the issue described on this page.

Customers who have upgraded Jira Service Desk Server & Jira Service Desk Data Center to 3.9.16, 3.16.8, 4.1.3, 4.2.5, 4.3.4, or 4.4.1 are not affected.

Customers who have downloaded and installed Jira Service Desk Server & Jira Service Desk Data Center versions:

  • All versions before 3.9.16
  • 3.10.x
  • 3.11.x
  • 3.12.x
  • 3.13.x
  • 3.14.x
  • 3.15.x
  • 3.16.x before 3.16.8 (the fixed version for 3.16.x)
  • 4.0.x
  • 4.1.x before 4.1.3 (the fixed version for 4.1.x)
  • 4.2.x before 4.2.5 (the fixed version for 4.2.x)
  • 4.3.x before 4.3.4 (the fixed version for 4.3.x)
  • 4.4.0 before 4.4.1 (the fixed version for 4.4.x)

Please upgrade your Jira Service Desk Server & Jira Service Desk Data Center installations immediately to fix this vulnerability.

URL path traversal allows information disclosure - CVE-2019-14994

Severity

Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low.

This is our assessment and you should evaluate its applicability to your own IT environment.

Description

By design, Jira Service Desk gives customer portal users permissions only to raise requests and view issues. This allows users to interact with the customer portal without having direct access to Jira. These restrictions can be bypassed by any attacker with portal access* who exploits a path traversal vulnerability. Exploitation allows an attacker to view all issues within all Jira projects contained in the vulnerable instance. This could include Jira Service Desk projects, Jira Core projects, and Jira Software projects.

All versions of Jira Service Desk before 3.9.16, from 3.10.0 before 3.16.8, from 4.0.0 before 4.1.3, from 4.2.0 before 3.2.5, from 4.3.0 before 4.3.4, and 4.4.0 are affected by this vulnerability. This issue can be tracked here:  JSDSERVER-6517 - Getting issue details... STATUS

* Note that attackers can grant themselves access to Jira Service Desk portals that have the Anyone can email the service desk or raise a request in the portal setting enabled. Changing this permission does not remove the vulnerability to an exploit by an attacker that has portal access. Atlassian does not recommend changing the permission, instead please read-on and follow the instructions outline in the section: What you need to do

Acknowledgements

We would like to acknowledge Sam Curry for finding this vulnerability.

Fix

We have released the following versions of Jira Service Desk Server & Jira Service Desk Data Center to address this issue:

What You Need to Do

Mitigation

If you are unable to upgrade Jira Service Desk immediately or are in the process of migrating to Jira Cloud, then as a temporary workaround, you can:

After upgrading Jira Service Desk this mitigation can be removed.

Upgrading Jira Service Desk

Atlassian recommends that you upgrade to the latest version. For a full description of the latest version of Jira Service Desk Server & Jira Service Desk Data Center, see the Release Notes. You can download the latest version of Jira Service Desk Server & Jira Service Desk Data Center from the Download Center.

Upgrade Jira Service Desk to a version as specified below.

Upgrading Jira Service Desk also requires upgrading Jira Core. Check the compatibility matrix to find the equivalent version for your Jira Service Desk version.

If you have version......then upgrade to this bugfix version:

4.4.0

4.4.1

4.3.x

4.3.4

4.2.x

4.2.5

4.1.x

4.1.3

3.16.x

3.16.8

3.9.x

3.16.8 (Recommended)

3.9.16

Older versions

Current versions:

4.4.1

4.3.4

Enterprise releases:

3.16.8 (Recommended)

3.9.16

Finding Evidence of Exploitation

The Jira KB contains instructions on how to determine if any attempts were made to exploit your Jira Service Desk instance.

Please note: Atlassian has no evidence that this vulnerability has been exploited in the wild.

Support

If you did not receive an email for this advisory and you wish to receive such emails in the future go to https://my.atlassian.com/email and subscribe to Alerts emails.

If you have questions or concerns regarding this advisory, please raise a support request at https://support.atlassian.com/.

References

Security Bug fix Policy

As per our new policy critical security bug fixes will be back ported in accordance with https://www.atlassian.com/trust/security/bug-fix-policy.  We will release new maintenance releases for the versions covered by the policy instead of binary patches.

Binary patches are no longer released. 

Severity Levels for security issuesAtlassian security advisories include a severity level and a CVE identifier. This severity level is based on our self-calculated CVSS score for each specific vulnerability. CVSS is an industry standard vulnerability metric. You can also learn more about CVSS at FIRST.org.
End of Life Policy Our end of life policy varies for different products. Please refer to our EOL Policy for details. 
Last modified on Mar 3, 2021

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.