Software

Devops

Jira Data Center user? Here's a critical Ehcache vulnerability to spoil your day

Update now – and maybe firewall the thing off while you're at it


Atlassian has warned Jira Data Center users of a critical vulnerability, offering attackers the opportunity for arbitrary remote code execution – and they're easily exploited over the network.

"This advisory discloses a critical severity security vulnerability introduced in version 6.3.0 of Jira Data Center, Jira Core Data Center, Jira Software Data Center, and Jira Service Management Data Center (known as Jira Service Desk prior to 4.14)," Atlassian said in a security bulletin published late last night.

"Atlassian rates the severity level of this vulnerability as critical," it continued, the highest on its four-point severity scale following the vulnerability being given a CVSS score of 9.8 – just below the 10-point maximum.

"Jira Data Center, Jira Core Data Center, Jira Software Data Center, and Jira Service Management Data Center exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011, could execute arbitrary code of their choice in Jira through deserialisation due to a missing authentication vulnerability," the company continued.

"While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service."

First released in 2003 by Greg Luck, the palindromic Ehcache is an open-source Java distributed cache designed to boost performance – but a lack of authentication in Atlassian's implementation left it wide open to exploitation.

The flaw is severe, and to Atlassian's chagrin is likely to hurt the biggest of its customers: those running the Data Center family of products. "Non-Data Center instances of Jira Server (Core & Software) and Jira Service Management are not affected," Atlassian confirmed.

"Jira Cloud customers are not affected. Jira Service Management Cloud customers are not affected."

Atlassian is recommending that all Jira Data Center users apply "the use of firewalls or similar technologies" to lock down access to ports 40001 and 40011 with immediate effect, regardless of whether its fix for the flaw is installed – though warns that "Data Center cluster nodes still need to be able to connect to other cluster nodes' Ehcache ports."

"Restricting access to ports isn't always as simple as it sounds," ESET UK security expert Jake Moore told The Register. "Most people in the industry will know that ports should be restricted or blocked that are not in use or essential to the day-to-day running of a network.

"But in reality some will get missed and cause a potential vulnerability. Updating to the latest patch is, needless to say, vital for any affected users. but it comes also as a reminder to check all open ports to prevent further risks."

Those running Jira Data Center are advised to upgrade to version 8.17.0 or higher, while Jira Service Management Data Center users should be looking to upgrade to 4.17.0 or higher to fix the vulnerability.

"If you cannot upgrade to 8.17.0, then upgrade to 8.5.16 or 8.13.8," the company told Jira Centre users, while adding for Jira Service Management Data Center users: "If you cannot upgrade to 4.17.0, then upgrade to 4.5.16 or 4.13.8."

The vulnerability was reported to Atlassian by security researcher Harrison Neal, who had previously disclosed vulnerabilities to companies including HPE and IBM through Trend Micro's Zero Day Initiative.

Atlassian did not respond to a request for additional comment in time for publication. ®

Send us news
Post a comment

Delinea Secret Server customers should apply latest patches

Attackers could nab an org's most sensitive keys if left unaddressed

Rust rustles up fix for 10/10 critical command injection bug on Windows in std lib

BatBadBut hits Erlang, Go, Python, Ruby as well

Hotel check-in terminal bug spews out access codes for guest rooms

Attacks could be completed in seconds, compromising customer safety

Ivanti commits to secure-by-design overhaul after vulnerability nightmare

CEO addresses whirlwind start to 2024 and how it plans to prevent a repeat

Microsoft confirms memory leak in March Windows Server security update

ALSO: Viasat hack wiper malware is back, users are the number one cause of data loss, and critical vulns

JetBrains keeps mum on 26 'security problems' fixed after Rapid7 spat

Vendor takes hardline approach to patch disclosure to new levels

Nvidia's newborn ChatRTX bot patched for security bugs

Flaws enable privilege escalation and remote code execution

These 17,000 unpatched Microsoft Exchange servers are a ticking time bomb

One might say this is a wurst case scenario

Uncle Sam's had it up to here with 'unforgivable' SQL injection flaws

Software slackers urged to up their game

Mozilla fixes $100,000 Firefox zero-days following two-day hackathon

Users may have to upgrade twice to protect their browsers

Some 300,000 IPs vulnerable to this Loop DoS attack

Easy to exploit, not yet exploited, not widely patched – pick three

3 million doors open to uninvited guests in keycard exploit

As months go by without fixes, hotels take the scenic route to securing rooms