First published: Fri Oct 06 2023(Updated: )
Discourse-jira is a Discourse plugin allows Jira projects, issue types, fields and field options will be synced automatically. An administrator user can make an SSRF attack by setting the Jira URL to an arbitrary location and enabling the `discourse_jira_verbose_log` site setting. A moderator user could manipulate the request path to the Jira API, allowing them to perform arbitrary GET requests using the Jira API credentials, potentially with elevated permissions, used by the application.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse Jira | <=2023-10-01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44384 is a vulnerability in the Discourse-jira plugin that allows an administrator user to perform a Server-Side Request Forgery (SSRF) attack by manipulating the Jira URL.
CVE-2023-44384 has a severity rating of 4.1, which is classified as medium.
Discourse-jira is a plugin for Discourse that enables synchronization of Jira projects, issue types, fields, and field options.
SSRF stands for Server-Side Request Forgery, which is a type of vulnerability that allows an attacker to make requests from the vulnerable server to internal or external network resources.
An administrator user can perform an SSRF attack by setting the Jira URL to a malicious location and enabling the `discourse_jira_verbose_log` site setting.