CVE-2018-16281

9.8 CRITICAL

📋 TL;DR

CVE-2018-16281 is an incorrect access control vulnerability in the DEISER Profields app for Jira that allows unauthorized users to access or modify project custom fields. This affects Jira instances running Profields versions before 6.0.2. Attackers could exploit this to manipulate project data or escalate privileges.

💻 Affected Systems

Products:
  • DEISER Profields - Project Custom Fields for Jira
Versions: All versions before 6.0.2
Operating Systems: All platforms running Jira
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Jira installation with Profields app installed. Vulnerability exists regardless of Jira version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Jira instance through privilege escalation, data manipulation, or unauthorized access to sensitive project information.

🟠

Likely Case

Unauthorized access to project custom fields leading to data exposure or manipulation of project configurations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, but still potential for data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Access control bypass vulnerabilities typically require some level of access but can be exploited with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.2

Vendor Advisory: https://marketplace.atlassian.com/apps/1210816/profields-project-custom-fields/version-history

Restart Required: Yes

Instructions:

1. Log into Jira as administrator. 2. Navigate to Manage apps/Add-ons. 3. Check for updates to Profields app. 4. Update to version 6.0.2 or later. 5. Restart Jira service.

🔧 Temporary Workarounds

Disable Profields app

all

Temporarily disable the vulnerable Profields app until patching is possible

Navigate to Jira admin panel > Manage apps > Disable Profields app

Restrict network access

all

Limit access to Jira instance to trusted networks only

Configure firewall rules to restrict Jira access to authorized IP ranges

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized access attempts
  • Disable or remove the Profields app entirely if not essential

🔍 How to Verify

Check if Vulnerable:

Check Profields app version in Jira admin panel under Manage apps/Add-ons

Check Version:

Navigate to Jira admin > Manage apps > Find Profields app and check version

Verify Fix Applied:

Verify Profields app version is 6.0.2 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to custom fields
  • Unauthorized modification of project configurations
  • Access attempts from unexpected user accounts

Network Indicators:

  • Unusual API calls to custom field endpoints
  • Suspicious traffic patterns to Jira instance

SIEM Query:

source="jira.log" AND ("custom field" OR "profields") AND (access OR modify OR unauthorized)

🔗 References

📤 Share & Export