Description Preview
Overview
This vulnerability (CWE-639: Authorization Bypass Through User-Controlled Key) allows unauthorized access to private information in Jira instances. The issue exists in the Workload Pie Chart Gadget component where improper access controls allow unauthenticated attackers to view names of private projects and filters that should be restricted. While the vulnerability doesn't provide full access to the private project contents, it leaks information about the existence and names of private projects, which could be valuable intelligence for attackers planning further targeted attacks or attempting to map an organization's internal structure and activities.
Remediation
Organizations using affected versions of Jira Server or Data Center should upgrade to patched versions immediately. The fixed versions are 8.13.12 or 8.20.0 and later. If immediate upgrading is not possible, consider implementing network-level controls to restrict access to the Jira instance only to trusted users and networks. Additionally, review and audit the usage of gadgets, particularly the Workload Pie Chart Gadget, and consider temporarily disabling it until the upgrade can be completed. After upgrading, conduct a security review to ensure no unauthorized access occurred during the vulnerable period.
References
- Atlassian Jira Server issue tracker: https://jira.atlassian.com/browse/JRASERVER-72916
- CWE-639: Authorization Bypass Through User-Controlled Key: https://cwe.mitre.org/data/definitions/639.html
- Atlassian Security Advisory for CVE-2021-41307
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing: Medium
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- Finance and InsuranceFinance and Insurance: Low
- InformationInformation: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Retail TradeRetail Trade: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- Public AdministrationPublic Administration: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- ConstructionConstruction: Low
- Educational ServicesEducational Services: Low
- MiningMining: Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- UtilitiesUtilities: Low
- Wholesale TradeWholesale Trade: Low