Impact of CVE-2020-1938 on Atlassian products

Still need help?

The Atlassian Community is here for you.

Ask the community

Platform notice: Server and Data Center only. This article only applies to Atlassian products on the Server and Data Center platforms.

Support for Server* products ended on February 15th 2024. If you are running a Server product, you can visit the Atlassian Server end of support announcement to review your migration options.

*Except Fisheye and Crucible

Problem

The recently disclosed vulnerability regarding Tomcat affects the following versions:
- Apache Tomcat 6
- Apache Tomcat 7x <7.0.100
- Apache Tomcat 8x <8.5.51
- Apache Tomcat 9x <9.0.31

The exploit is only possible if you are using an AJP connector, not the regular HTTP connector that is used by default in both Jira and Confluence.  You are only at risk for this exploit if you have manually configured your instance to use an AJP connector.  You can verify if you are using an AJP connector by checking your $Jira-INSTALL/conf/server.xml file.  By default the relevant section will look like the below example.  If this is commented out in your instance as denoted by <!-- and -->  then your instance is not at risk for this CVE.  The following example is from an instance that is not affected by this CVE.


         ==============================================================================================================
         AJP - Proxying Jira via Apache over HTTP or HTTPS

         If you're proxying traffic to Jira using the AJP protocol, uncomment the following connector line
         See the following for more information:

            Apache - https://confluence.atlassian.com/x/QiJ9MQ
         ==============================================================================================================
        -->

        <!--
        <Connector port="8009" URIEncoding="UTF-8" enableLookups="false" protocol="AJP/1.3"/>
        -->


At the time of this writing the latest version of Jira, 8.7.1 is shipped with Tomcat 8.5.42 which is still a Tomcat version that is vulnerable to this CVE if the AJP connector is enabled.  If your instance is using the AJP connector you will want to utilize another connector method such as the HTTP connector until Jira/Confluence are released with an updated version of Tomcat.


The following KB should not be utilized on affected versions of Jira:

Configuring Apache Reverse Proxy Using the AJP Protocol


DescriptionCVE-2020-1938
ProductJira, Confluence

Last modified on May 2, 2022

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.