Matt Posted August 7, 2013 Report Posted August 7, 2013 Description : Atlassian JIRA suffers from a reflective cross site scripting issue due to a failure to properly sanitize user-supplied input to the 'name' GET parameter in the 'deleteuserconfirm.jsp' script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session. Versions 6.0.2 and 6.0.3 are affected.Author : LiquidWormSource : Atlassian JIRA 6.0.3 Cross Site Scripting ? Packet StormCode : Atlassian JIRA v6.0.3 Arbitrary HTML/Script Execution VulnerabilityVendor: Atlassian Corporation Pty Ltd.Product web page: https://www.atlassian.comAffected version: 6.0.3 and 6.0.2Summary: JIRA is an issue tracking project management softwarefor teams planning, building, and launching great products.Desc: JIRA suffers from a reflected XSS issue due to a failureto properly sanitize user-supplied input to the 'name' GET parameterin the 'deleteuserconfirm.jsp' script. Attackers can exploit thisweakness to execute arbitrary HTML and script code in a user's browsersession.Vulnerable JSP script location:- jira-components/jira-webapp/src/main/webapp/secure/admin/user/views/deleteuserconfirm.jspTested on: Microsoft Windows 7 Ultimate SP1 (EN)Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscienceAdvisory ID: ZSL-2013-5151Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5151.phpVendor: https://jira.atlassian.com/browse/JRA-34160 https://jira.atlassian.com/browse/JRA/fixforversion/33790 https://jira.atlassian.com/browse/JRA/fixforversion/3431025.06.2013-- http://localhost:8080/secure/admin/user/DeleteUser!default.jspa?name=a"><script>alert(document.cookie);</script>&returnUrl=UserBrowser.jspa Quote