CVE-2021-26071:CSRF vulnerability in Jira Server and Data Center allows anonymous attackers to modify Jira Software configuration.

splash
Back

Description Preview

A cross-site request forgery (CSRF) vulnerability exists in the SetFeatureEnabled.jspa resource in Jira Server and Data Center. This vulnerability allows remote anonymous attackers to enable and disable Jira Software configuration without authorization. The vulnerability affects versions before 8.5.13, versions 8.6.0 to 8.13.5 (excluding 8.13.5), and versions 8.14.0 to 8.15.1 (excluding 8.15.1).

Overview

This vulnerability (CVE-2021-26071) is a Cross-Site Request Forgery (CSRF) issue affecting Atlassian Jira Server and Data Center. The vulnerability exists in the SetFeatureEnabled.jspa resource, which lacks proper CSRF protections. When exploited, it allows unauthenticated remote attackers to trick authenticated administrators into enabling or disabling Jira Software features by having them visit a malicious website that sends forged requests to the vulnerable Jira instance. This could lead to unauthorized changes to the Jira configuration, potentially affecting the functionality and security of the application. The vulnerability is classified as CWE-352 (Cross-Site Request Forgery).

Remediation

To remediate this vulnerability, administrators should upgrade to one of the following fixed versions:

  • Version 8.5.13 or later if running 8.5.x
  • Version 8.13.5 or later if running 8.6.0 through 8.13.x
  • Version 8.15.1 or later if running 8.14.0 through 8.15.0

If immediate patching is not possible, consider implementing additional security controls:

  1. Configure web application firewalls to filter suspicious requests
  2. Implement network-level access controls to limit who can access the Jira instance
  3. Educate users about CSRF attacks and the risks of clicking on unknown links
  4. Monitor system logs for unusual activity related to feature configuration changes

References

  1. Atlassian Jira Server and Data Center issue tracker: https://jira.atlassian.com/browse/JRASERVER-72233
  2. MITRE CWE-352 (Cross-Site Request Forgery): https://cwe.mitre.org/data/definitions/352.html
  3. Atlassian Security Advisory: https://jira.atlassian.com/browse/JRASERVER-72233

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing
    Manufacturing
  2. Health Care & Social Assistance
    Health Care & Social Assistance
  3. Management of Companies & Enterprises
    Management of Companies & Enterprises
  4. Educational Services
    Educational Services
  5. Public Administration
    Public Administration
  6. Transportation & Warehousing
    Transportation & Warehousing
  7. Wholesale Trade
    Wholesale Trade
  8. Accommodation & Food Services
    Accommodation & Food Services
  9. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  10. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  11. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  12. Construction
    Construction
  13. Finance and Insurance
    Finance and Insurance
  14. Information
    Information
  15. Mining
    Mining
  16. Other Services (except Public Administration)
    Other Services (except Public Administration)
  17. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  18. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  19. Retail Trade
    Retail Trade
  20. Utilities
    Utilities

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database