First published: Fri Aug 23 2019(Updated: )
The startup.jsp resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira | <7.13.6 | |
Atlassian Server | >=8.0.0<8.2.3 | |
Atlassian Server | >=8.3.0<8.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11585 is considered a medium severity vulnerability due to its potential to facilitate phishing attacks.
To fix CVE-2019-11585, upgrade your Jira instance to version 7.13.6 or later, or to versions 8.2.3 or later if you are on versions between 8.0.0 and 8.2.3, or between 8.3.0 and 8.3.2.
The impact of CVE-2019-11585 is the possibility for attackers to execute an open redirect, allowing navigation to malicious websites.
Jira versions prior to 7.13.6, and versions from 8.0.0 before 8.2.3, as well as from 8.3.0 before 8.3.2 are affected by CVE-2019-11585.
Yes, CVE-2019-11585 can be exploited remotely by attackers to redirect users to harmful sites.