We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2017-18113



Description

The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 allows remote attackers who can trick a system administrator to import their malicious workflow to execute arbitrary code via a Remote Code Execution (RCE) vulnerability. The vulnerability allowed for various problematic OSWorkflow classes to be used as part of workflows. The fix for this issue blocks usage of unsafe conditions, validators, functions and registers that are build-in into OSWorkflow library and other Jira dependencies. Atlassian-made functions or functions provided by 3rd party plugins are not affected by this fix.

Reserved 2018-02-01 | Published 2021-08-02 | Updated 2024-10-17 | Assigner atlassian

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

Any version before 8.18.1
affected

Any version before 8.18.1
affected

References

jira.atlassian.com/browse/JRASERVER-72660

cve.org (CVE-2017-18113)

nvd.nist.gov (CVE-2017-18113)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2017-18113

Support options

Helpdesk Chat, Email, Knowledgebase