PT-2009-40: JIRA sensitive information disclosure

Affected Software

JIRA
Versions prior to 3.13.4-#354


Product Link:
http://www.atlassian.com/software/jira/

Severity Rating

Severity: Low
Impact: Sensitive information disclosure
Attack Vector: Remote

CVSS v2

Base Score: 0.0
Temporal Score: 0.0
Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:N/E:P/RL:O/RC:C)

CVE: not assigned

Software Description

JIRA lets you prioritise, assign, track, report and audit your 'issues,' whatever they may be — from software bugs and help-desk tickets to project tasks and change requests.

Vulnerability Description

Positive Technologies Research Team has discovered a sensitive information disclosure vulnerability in JIRA.

The vulnerability was detected when calling "/secure/ConfigureReleaseNote.jspa" script.

An attacker who successfully exploited this vulnerability could identify web server root folder and other server sensitive data.

Solution

Update to lastest version.

Workaround

You can workaround the problem by editing your atlassian-jira/500page.jsp and removing this line:
...
<li><webwork:text name="'system.error.step3'"><webwork:param name="'value0'"><% out.println(extendedSystemInfoUtils.getLogPath());%></webwork:param></webwork:text>
...

Disclosure Timeline

06/02/2009 - Vendor notified
06/03/2009 - Vendor response
06/04/2009 - The vendor confirmed the vulnerability and issued a workaround decision
06/24/2009 - Requested status update from vendor
06/24/2009 - Public disclosure

Credits

This vulnerability was discovered by Dmitry Evteev (Positive Technologies Research Team) using professional network security scanner MaxPatrol.

References

http://en.securitylab.ru/lab/PT-2009-40
http://www.ptsecurity.ru/advisory.asp

Complete list of vulnerability reports published by Positive Technologies Research Team:

http://en.securitylab.ru/lab/
http://www.ptsecurity.ru/advisory.asp