7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
h3. Issue Summary
Jira uses {{Bouncy Castle}} library in version 1.50 that’s vulnerable to 10 CVEs:
[https://www.cvedetails.com/cve/CVE-2015-7940/]
[https://www.cvedetails.com/cve/CVE-2016-1000338/]
[https://www.cvedetails.com/cve/CVE-2016-1000339/]
[https://www.cvedetails.com/cve/CVE-2016-1000341/]
[https://www.cvedetails.com/cve/CVE-2016-1000342/]
[https://www.cvedetails.com/cve/CVE-2016-1000343/]
[https://www.cvedetails.com/cve/CVE-2016-1000344/]
[https://www.cvedetails.com/cve/CVE-2016-1000345/]
[https://www.cvedetails.com/cve/CVE-2016-1000346/]
[https://www.cvedetails.com/cve/CVE-2016-1000352/]
It is not clear if any of the vulnerabilities can actually be abused by an attacker.
The library should be updated to at least version 1.56 to fix those CVEs.
However, that version has other known vulnerabilities, so it’s recommended to update it to at least 1.61.
h3. Workaround
There is no known workaround for this behavior.
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N