Documentation for JIRA 5.2. Documentation for other versions of JIRA is available too.
In this advisory:
Atlassian rates these vulnerabilities as high, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank a vulnerability as critical, high, moderate or low.
We have identified and fixed a number of cross-site scripting (XSS) vulnerabilities which may affect JIRA instances. These vulnerabilities have security implications and are especially important for anyone running publicly accessible instances of JIRA. XSS vulnerabilities allow an attacker to embed their own JavaScript into a JIRA page. You can read more about XSS attacks at cgisecurity, the Web Application Security Consortium and other places on the web.
Some values from JIRA URLs were being injected directly into JavaScript, potentially enabling an attacker to add scripts to another user's response.
All versions of JIRA prior to 4.2.1 are affected.
We strongly recommend upgrading your JIRA installation to fix these vulnerabilities. Please see the 'Fix' section below.
These issues have been fixed in JIRA 4.2.1 and later, and are available as a patch for JIRA 3.13.5, 4.0.2 and 4.1.2 (please see JRA-22493).
Atlassian rates this vulnerability as high, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank a vulnerability as critical, high, moderate or low.
We have identified and fixed several cross-site request forgery (XSRF/CSRF) vulnerabilities in JIRA. These vulnerabilities have security implications and are especially important for anyone running publicly accessible instances of JIRA.
You can read more about XSRF/CSRF attacks at cgisecurity, wikipedia and other places on the web.
Some JIRA administration screens did not have XSRF protection. A targetted attack on a vulnerable system could result in an attacker gaining access to user credentials, potentially giving them access to the JIRA data and system.
All versions of JIRA prior to 4.2.1 are affected.
We strongly recommend upgrading your JIRA installation to fix these vulnerabilities. Please see the 'Fix' section below.
JIRA's XSRF protection has been extended to cover previously unprotected areas. The known XSRF issues have been fixed in JIRA 4.2.1 and later, and are available as a patch for JIRA 3.13.5, 4.0.2 and 4.1.2 (please see JRA-22493).
Atlassian rates this vulnerability as moderate, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank a vulnerability as critical, high, moderate or low.
We have identified and fixed a vulnerability relating to the creation of secure tokens, which are used in various authentication mechanisms. These vulnerabilities have security implications and are especially important for anyone running publicly accessible instances of JIRA.
A highly skilled attacker could potentially forge a secure token, allowing them to impersonate a legitimate user.
All versions of JIRA prior to 4.2 are affected.
We strongly recommend upgrading your JIRA installation to fix this vulnerabily. Please see the 'Fix' section below.
This issue has been fixed in JIRA 4.2 and later. The random number-generator that is used to generate tokens has been hardened.
Atlassian rates this vulnerability as low, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank a vulnerability as critical, high, moderate or low.
We have identified and fixed a data vulnerability in JIRA. This vulnerability has security implications and is especially important for anyone running publicly accessible instances of JIRA.
Component data could be view by unauthorised users.
All versions of JIRA prior to 4.2 are affected.
We strongly recommend upgrading your JIRA installation to fix this vulnerabily. Please see the 'Fix' section below.
This issue has been fixed in JIRA 4.2 and later.