ID CVE-2019-20415 Type cve Reporter cve@mitre.org Modified 2020-07-08T15:35:00
Description
Atlassian Jira Server and Data Center in affected versions allows remote attackers to modify logging and profiling settings via a cross-site request forgery (CSRF) vulnerability. The affected versions are before version 7.13.3, and from version 8.0.0 before 8.1.0.
{"atlassian": [{"lastseen": "2020-12-24T14:35:24", "bulletinFamily": "software", "cvelist": ["CVE-2019-20415"], "description": "Atlassian Jira Server and Data Center in affected versions allows remote attackers to modify logging and profiling settings via a cross-site request forgery (CSRF) vulnerability.\r\n\r\n*Affected versions:*\r\n * version < 7.13.3\r\n * 8.0.0 \u2264 version < 8.1.0\r\n\r\n*Fixed versions:*\r\n * 7.13.3\r\n * 8.1.0", "edition": 7, "modified": "2020-07-01T00:40:33", "published": "2020-04-01T04:01:59", "id": "ATLASSIAN:JRASERVER-70849", "href": "https://jira.atlassian.com/browse/JRASERVER-70849", "title": "CSRF via Logging and Profiling feature - CVE-2019-20415", "type": "atlassian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "nessus": [{"lastseen": "2020-09-14T15:42:57", "description": "According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is \n7.13.x prior to 7.13.3 or version 8.x prior to 8.1.0. It is, therefore, affected by a cross-site request forgery (XSRF)\nvulnerability that allows remote, unauthenticated attackers to modify logging and profiling settings.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.", "edition": 3, "cvss3": {"score": 4.3, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}, "published": "2020-07-22T00:00:00", "title": "Atlassian Jira 7.13.x < 7.13.3 / 8.x < 8.1.0 CSRF via Logging and Profiling Feature (JRASERVER-70849)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-20415"], "modified": "2020-07-22T00:00:00", "cpe": ["cpe:/a:atlassian:jira"], "id": "JIRA_8_1_0_JRASERVER-70849.NASL", "href": "https://www.tenable.com/plugins/nessus/138840", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(138840);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/23\");\n\n script_cve_id(\"CVE-2019-20415\");\n\n script_name(english:\"Atlassian Jira 7.13.x < 7.13.3 / 8.x < 8.1.0 CSRF via Logging and Profiling Feature (JRASERVER-70849)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server hosts a web application that is affected by a CSRF vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is \n7.13.x prior to 7.13.3 or version 8.x prior to 8.1.0. It is, therefore, affected by a cross-site request forgery (XSRF)\nvulnerability that allows remote, unauthenticated attackers to modify logging and profiling settings.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://jira.atlassian.com/browse/JRASERVER-70849\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Atlassian Jira version 7.13.3, 8.1.0 or later\");\n script_set_attribute(attribute:\"agent\", value:\"all\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-20415\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/04/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:atlassian:jira\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"jira_detect.nasl\", \"atlassian_jira_win_installed.nbin\", \"atlassian_jira_nix_installed.nbin\");\n script_require_keys(\"installed_sw/Atlassian JIRA\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp_info = vcf::combined_get_app_info(app:'Atlassian JIRA');\n\nconstraints = [\n { 'min_version' : '7.13', 'fixed_version' : '7.13.3' },\n { 'min_version' : '8.0.0', 'fixed_version' : '8.1.0' }\n];\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING, flags:{'xsrf':TRUE});\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}