Atlassian Jira Service Desk Server up to 4.5.0 Customer Context Filter Request path traversal
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.7 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Atlassian Jira Service Desk Server and Jira Service Desk Data Center up to 4.5.0 and classified as critical. This issue affects some unknown processing of the component Customer Context Filter. The manipulation as part of Request leads to path traversal. The identification of this vulnerability is CVE-2019-15004. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component. Once again VulDB remains the best source for vulnerability data.
Details
A vulnerability has been found in Atlassian Jira Service Desk Server and Jira Service Desk Data Center up to 4.5.0 (Bug Tracking Software) and classified as critical. This vulnerability affects an unknown functionality of the component Customer Context Filter. The manipulation as part of a Request leads to a path traversal vulnerability. The CWE definition for the vulnerability is CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before 3.9.17, from 3.10.0 before 3.16.10, from 4.0.0 before 4.2.6, from 4.3.0 before 4.3.5, from 4.4.0 before 4.4.3, and from 4.5.0 before 4.5.1 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via a path traversal vulnerability. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability.
The weakness was shared 11/07/2019. This vulnerability was named CVE-2019-15004 since 08/13/2019. The attack can be initiated remotely. The successful exploitation needs a single authentication. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1006 by the MITRE ATT&CK project.
Upgrading to version 3.9.17, 3.10.10, 4.2.6, 4.3.5, 4.4.3 or 4.5.1 eliminates this vulnerability.
The entry VDB-145173 is related to this item. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
- 3.9.0
- 3.9.1
- 3.9.2
- 3.9.3
- 3.9.4
- 3.9.5
- 3.9.6
- 3.9.7
- 3.9.8
- 3.9.9
- 3.9.10
- 3.9.11
- 3.9.12
- 3.9.13
- 3.9.14
- 3.9.15
- 3.9.16
- 3.10.0
- 3.10.1
- 3.10.2
- 3.10.3
- 3.10.4
- 3.10.5
- 3.10.6
- 3.10.7
- 3.10.8
- 3.10.9
- 4.0
- 4.1
- 4.2
- 4.2.0
- 4.2.1
- 4.2.2
- 4.2.3
- 4.2.4
- 4.2.5
- 4.3
- 4.3.0
- 4.3.1
- 4.3.2
- 4.3.3
- 4.3.4
- 4.4
- 4.4.0
- 4.4.1
- 4.4.2
- 4.5.0
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.9VulDB Meta Temp Score: 6.7
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Jira Service Desk Server/Jira Service Desk Data Center 3.9.17/3.10.10/4.2.6/4.3.5/4.4.3/4.5.1
Timeline
08/13/2019 🔍11/07/2019 🔍
11/07/2019 🔍
02/05/2024 🔍
Sources
Vendor: atlassian.comAdvisory: 155214
Status: Not defined
CVE: CVE-2019-15004 (🔍)
GCVE (CVE): GCVE-0-2019-15004
GCVE (VulDB): GCVE-100-145174
See also: 🔍
Entry
Created: 11/07/2019 10:27 AMUpdated: 02/05/2024 12:36 PM
Changes: 11/07/2019 10:27 AM (39), 11/07/2019 10:32 AM (18), 02/05/2024 12:36 PM (5)
Complete: 🔍
Cache ID: 18:A08:40
No comments yet. Languages: en.
Please log in to comment.