CVE-2021-41305

7.5 HIGH

📋 TL;DR

This vulnerability allows anonymous remote attackers to view private project and filter names in Atlassian Jira Server and Data Center via an Insecure Direct Object Reference (IDOR) flaw in the Average Number of Times in Status Gadget. Organizations running affected Jira versions before 8.13.12 are impacted, potentially exposing sensitive internal project information.

💻 Affected Systems

Products:
  • Atlassian Jira Server
  • Atlassian Jira Data Center
Versions: All versions before 8.13.12
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Jira Server and Data Center deployments. The vulnerability is in a specific gadget component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers map organizational structure, identify sensitive projects, and use this reconnaissance for targeted attacks or social engineering campaigns.

🟠

Likely Case

Unauthorized disclosure of private project and filter names, potentially revealing internal initiatives, team structures, or confidential work.

🟢

If Mitigated

Limited information disclosure with no access to actual project content or data.

🌐 Internet-Facing: HIGH - Vulnerability allows unauthenticated remote exploitation from the internet.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this for reconnaissance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

IDOR vulnerabilities typically have low exploitation complexity. No public exploit code is known, but the vulnerability type suggests straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.13.12 and later

Vendor Advisory: https://jira.atlassian.com/browse/JRASERVER-72813

Restart Required: Yes

Instructions:

1. Download Jira version 8.13.12 or later from Atlassian's website. 2. Backup your Jira instance and database. 3. Stop Jira service. 4. Install the updated version following Atlassian's upgrade guide. 5. Restart Jira service. 6. Verify the update was successful.

🔧 Temporary Workarounds

Disable the vulnerable gadget

all

Remove or disable the Average Number of Times in Status Gadget from all dashboards

Navigate to Jira Administration > System > General Configuration > Gadgets
Disable or remove the affected gadget

Restrict anonymous access

all

Configure Jira to require authentication for all users

Navigate to Jira Administration > System > General Configuration > Global Permissions
Remove 'Anyone' from Browse Users permission
Configure project permissions to remove anonymous access

🧯 If You Can't Patch

  • Implement network-level restrictions to limit Jira access to trusted IP addresses only
  • Enable detailed logging and monitoring for suspicious access patterns to the affected gadget

🔍 How to Verify

Check if Vulnerable:

Check Jira version in Administration > System > System Info. If version is below 8.13.12, the system is vulnerable.

Check Version:

Check via Jira web interface: Administration > System > System Info, or via command line: cat /path/to/jira/atlassian-jira/META-INF/maven/com.atlassian.jira/jira-core/pom.xml | grep version

Verify Fix Applied:

After patching, verify version is 8.13.12 or higher. Test anonymous access to the Average Number of Times in Status Gadget to confirm private project names are no longer accessible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual anonymous user access to gadget endpoints
  • Multiple failed authentication attempts followed by gadget access
  • Access to /rest/gadget/1.0/current/gadgets/* endpoints from unauthenticated users

Network Indicators:

  • HTTP requests to gadget REST API endpoints without authentication headers
  • Unusual traffic patterns to Jira from external IPs

SIEM Query:

source="jira.log" AND (uri_path="/rest/gadget/1.0/current/gadgets/" OR uri_path="/rest/gadget/1.0/current/gadgets/*") AND user="anonymous"

🔗 References

📤 Share & Export