Vulnerability identifier: #VU14119
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-18104
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Jira Software
Client/Desktop applications /
Other client software
Vendor: Atlassian
Description
The disclosed vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to arbitrary data are not contained within the results of a specified JQL query. A remote attacker who is able to observe or otherwise intercept webhook events can learn information about changes in issues that should not be sent.
Mitigation
Update to versions 7.6.7, 7.11.0.
Vulnerable software versions
Jira Software: 7.0, 7.1 - 7.1.4, 7.2.0 - 7.2.13, 7.3, 7.4.0 - 7.4.4, 7.5.0 - 7.5.3, 7.6.0 - 7.6.6, 7.7.0 - 7.7.4, 7.8.0 - 7.8.4, 7.9.0 - 7.9.2
External links
https://jira.atlassian.com/browse/JRASERVER-59980
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.