CVE-2017-5983

The JIRA Workflow Designer Plugin in Atlassian JIRA Server before 6.3.0 improperly uses an XML parser and deserializer, which allows remote attackers to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:jira:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.0:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.7:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.1.8:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.5:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.6:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.7:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.8:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.9:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.10:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:5.2.11:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.5:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.6:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.7:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.8:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.1.9:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2.6:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:6.2.7:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://codewhitesec.blogspot.com/2017/04/amf.html - Technical Description () http://codewhitesec.blogspot.com/2017/04/amf.html - Technical Description
References () http://www.securityfocus.com/bid/97379 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97379 - Third Party Advisory, VDB Entry
References () https://confluence.atlassian.com/jira063/jira-security-advisory-2017-03-09-875604401.html - Vendor Advisory () https://confluence.atlassian.com/jira063/jira-security-advisory-2017-03-09-875604401.html - Vendor Advisory
References () https://jira.atlassian.com/browse/JRASERVER-64077 - Vendor Advisory () https://jira.atlassian.com/browse/JRASERVER-64077 - Vendor Advisory
References () https://www.kb.cert.org/vuls/id/307983 - Third Party Advisory, US Government Resource, VDB Entry () https://www.kb.cert.org/vuls/id/307983 - Third Party Advisory, US Government Resource, VDB Entry

Information

Published : 2017-04-10 15:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5983

Mitre link : CVE-2017-5983

CVE.ORG link : CVE-2017-5983


JSON object : View

Products Affected

atlassian

  • jira
CWE
CWE-502

Deserialization of Untrusted Data