Deserialization of Untrusted Data in Atlassian JIRA



| Updated: 2020-08-08
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-5983
CWE-ID CWE-502
Exploitation vector Network
Public exploit N/A
Vulnerable software
Jira Software
Client/Desktop applications / Other client software

Vendor Atlassian

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Deserialization of Untrusted Data

EUVDB-ID: #VU39218

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-5983

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The JIRA Workflow Designer Plugin in Atlassian JIRA Server before 6.3.0 improperly uses an XML parser and deserializer, which allows remote attackers to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Jira Software: 4.2.4 - 6.2.7

CPE2.3 External links

https://codewhitesec.blogspot.com/2017/04/amf.html
https://www.securityfocus.com/bid/97379
https://confluence.atlassian.com/jira063/jira-security-advisory-2017-03-09-875604401.html
https://jira.atlassian.com/browse/JRASERVER-64077
https://www.kb.cert.org/vuls/id/307983


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###