Lucene search

K
atlassianDraufJRASERVER-70686
HistoryFeb 21, 2020 - 8:37 a.m.

Upgrade Bouncy Castle to fix multiple CVEs

2020-02-2108:37:09
drauf
jira.atlassian.com
152

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.005

Percentile

77.4%

h3. Issue Summary

Jira uses {{Bouncy Castle}} library in version 1.50 that’s vulnerable to 10 CVEs:

[https://www.cvedetails.com/cve/CVE-2015-7940/]
[https://www.cvedetails.com/cve/CVE-2016-1000338/]
[https://www.cvedetails.com/cve/CVE-2016-1000339/]
[https://www.cvedetails.com/cve/CVE-2016-1000341/]
[https://www.cvedetails.com/cve/CVE-2016-1000342/]
[https://www.cvedetails.com/cve/CVE-2016-1000343/]
[https://www.cvedetails.com/cve/CVE-2016-1000344/]
[https://www.cvedetails.com/cve/CVE-2016-1000345/]
[https://www.cvedetails.com/cve/CVE-2016-1000346/]
[https://www.cvedetails.com/cve/CVE-2016-1000352/]

It is not clear if any of the vulnerabilities can actually be abused by an attacker.

The library should be updated to at least version 1.56 to fix those CVEs.
However, that version has other known vulnerabilities, so it’s recommended to update it to at least 1.61.
h3. Workaround
There is no known workaround for this behavior.

Affected configurations

Vulners
Node
atlassianjira_data_centerRange8.5.3
OR
atlassianjira_data_centerRange7.13.13
OR
atlassianjira_data_centerRange8.7.1
OR
atlassianjira_data_centerRange<8.5.4
OR
atlassianjira_data_centerRange<8.8.0
OR
atlassianjira_data_centerRange<7.13.14
OR
atlassianjira_data_centerRange<8.7.2

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.005

Percentile

77.4%