CVE-2023-42361

7.8 HIGH

📋 TL;DR

This Local File Inclusion vulnerability in Midori-global Better PDF Exporter for Jira allows attackers to read arbitrary files on the server by uploading crafted images during PDF export. It affects Jira Server and Data Center installations using the vulnerable plugin version. Attackers could potentially access sensitive configuration files, credentials, or other server data.

💻 Affected Systems

Products:
  • Midori-global Better PDF Exporter for Jira Server
  • Midori-global Better PDF Exporter for Jira Data Center
Versions: 10.3.0 and earlier versions
Operating Systems: All operating systems running Jira
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Better PDF Exporter plugin to be installed and enabled in Jira. Jira Server and Data Center installations are both affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via reading sensitive files like configuration files containing database credentials, SSH keys, or other authentication secrets, potentially leading to lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive server files including configuration files, logs, and potentially credential files, enabling further attacks or data exfiltration.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation, potentially only allowing access to non-sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user access to create or edit issues with image attachments in Jira, then trigger PDF export. The vulnerability is well-documented with public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.3.1 or later

Vendor Advisory: https://marketplace.atlassian.com/apps/5167/better-pdf-exporter-for-jira

Restart Required: Yes

Instructions:

1. Log into Jira as administrator. 2. Navigate to Manage apps/Add-ons. 3. Find Better PDF Exporter plugin. 4. Update to version 10.3.1 or later. 5. Restart Jira service.

🔧 Temporary Workarounds

Disable Better PDF Exporter plugin

all

Temporarily disable the vulnerable plugin until patching can be completed

Navigate to Jira Admin → Manage apps → Find Better PDF Exporter → Click Disable

Restrict image upload permissions

all

Limit which users can upload images to Jira issues to reduce attack surface

Configure Jira permissions to restrict image uploads to trusted users only

🧯 If You Can't Patch

  • Disable the Better PDF Exporter plugin completely
  • Implement strict file permission controls on the Jira server to limit accessible files

🔍 How to Verify

Check if Vulnerable:

Check the Better PDF Exporter plugin version in Jira Admin → Manage apps. If version is 10.3.0 or earlier, the system is vulnerable.

Check Version:

In Jira web interface: Admin → Manage apps → Find Better PDF Exporter → Check version number

Verify Fix Applied:

Verify the plugin version shows 10.3.1 or later in Jira Admin → Manage apps after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PDF export requests with image attachments
  • Multiple failed file access attempts in server logs
  • Access to sensitive file paths in application logs

Network Indicators:

  • Unusual outbound traffic from Jira server following PDF exports
  • Multiple PDF export requests from single user in short timeframe

SIEM Query:

source="jira.log" AND ("PDF export" OR "Better PDF") AND ("image" OR "attachment") AND status=200

🔗 References

📤 Share & Export