Workaround for CVE-2019-15003
Platform Notice: Data Center Only - This article only applies to Atlassian products on the Data Center platform.
Note that this KB was created for the Data Center version of the product. Data Center KBs for non-Data-Center-specific features may also work for Server versions of the product, however they have not been tested. Support for Server* products ended on February 15th 2024. If you are running a Server product, you can visit the Atlassian Server end of support announcement to review your migration options.
*Except Fisheye and Crucible
Problem
Affected Jira Service Management versions in CVE-2019-15003 will allow non-application access users - Service Management Customers to see restricted information in the Jira instance.
This allows Service Management Customers who normally don't have access to Jira information, this authorization bypass allows remote attackers with portal access to gain direct access to Jira with the same permissions.
This affects Jira Service Management portals that have the "Anyone can email the service project or raise a request in the portal" setting enabled, exploitation allows an attacker to view all issues within all Jira projects contained in the vulnerable instance.
Affected versions
All versions before 3.9.17
3.10.x
3.11.x
3.12.x
3.13.x
3.14.x
3.15.x
3.16.x before 3.16.11 (the fixed version for 3.16.x)
4.0.x
4.1.x
4.2.x before 4.2.6 (the fixed version for 4.2.x)
4.3.x before 4.3.5 (the fixed version for 4.3.x)
4.4.x before 4.4.3 (the fixed version for 4.4.x)
4.5.x before 4.5.1 (the fixed version for 4.5.x)
Permanent resolution below along with workarounds if immediate upgrade is not possible
Resolution
Upgrade to fixed version of Jira Service Management
3.9.17
3.16.11
4.2.6
4.3.5
4.4.3
4.5.1
Workaround
Block authorization bypass.
Workaround 1.
Redirect requests to Jira containing jspa, jspx, jsp to a safe URL
Add the following to the
<urlrewrite>
section of[jira-installation-directory]/atlassian-jira/
WEB-INF/urlrewrite.xml
:1 2 3 4
<rule> <from>(?s)/servicedesk/.*\.jsp.*</from> <to type="temporary-redirect">/</to> </rule>
Save the
urlrewrite.xml
Restart Jira
Workaround 2.
Block requests to Jira for authorization bypass at the reverse proxy or load-balancer level
Apache
Add the following into the .conf file that contains the virtualhost that proxies to Jira
1 2 3 4
<LocationMatch "/servicedesk/.*\.jsp.*"> Order Allow,Deny Deny from all </LocationMatch>
example below -
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
<VirtualHost *:80> ServerName jira.example.com ProxyRequests Off ProxyVia Off <Proxy *> Require all granted </Proxy> ProxyPass /jira http://ipaddress:8080/jira ProxyPassReverse /jira http://ipaddress:8080/jira <LocationMatch "/servicedesk/.*\.jsp.*"> Order Allow,Deny Deny from all </LocationMatch> </VirtualHost>
Restart your Apache proxy
Nginx
Add the following into the .conf file that contains the server block that proxies to Jira inside location block
1
if ($uri ~* "/servicedesk/.*\.jsp.*"){ return 403;}
example below -
1 2 3 4 5 6 7 8 9
location /jira { proxy_set_header X-Forwarded-Host $host; proxy_set_header X-Forwarded-Server $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass http://ipaddress:8080/jira; client_max_body_size 10M; if ($uri ~* "/servicedesk/.*\.jsp.*"){ return 403;} }
Restart your NGINX
Was this helpful?