The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via "cookie tossing" a CSRF cookie from a subdomain of a Jira instance.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://jira.atlassian.com/browse/JRASERVER-69791 | issue tracking vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835 | third party advisory exploit |