Hello All,
I'm working on mitigating the recent Jira security issue by Blocking the /secure/admin/SendBulkMail!default.jspa
endpoint from being accessed in Jira server. I don't find this property in server.xml or in other files.
Could someone please help me here?
Thank you.
Dear @Abhinav Arae ,
you can do this in two different manners:
Option 1:
Read this article and adapt server.xml to your needs.
Option 2:
Block the URL in front of Tomcat - within the reverse proxy configuration. For nginx follow this article.
So long
Thomas
Hello Thomas,
Thank you very much for your reply. I've tried the same and restarted the instance, but I'm still able to hit this page: https://jira.dev.****.com/secure/admin/SendBulkMail!default.jspa
I thought the expected outcome should be, we shouldn't be able to hit this page which mitigates the security issue, Am I correct?
I really appreciate your help!
Thank you.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Dear @Abhinav Arae ,
you commented both answers with the same comment, that it doesn't work. So why is the first answer accepted, when it didn't help? What do I miss?
Thomas
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Sorry, I unaccepted it now. Could you please help me fix this? I wonder if I'm adding the context path at the wrong location in server.xml file.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Can you paste your server.xml with out un-commented lines, please?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
<?xml version="1.0" encoding="utf-8"?>
<Server port="8005" shutdown="SHUTDOWN">
<Listener className="org.apache.catalina.startup.VersionLoggerListener" />
<!-- Security listener. Documentation at /docs/config/listeners.html
<Listener className="org.apache.catalina.security.SecurityListener" />
-->
<!--APR library loader. Documentation at /docs/apr.html -->
<Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="on" />
<!-- Prevent memory leaks due to use of particular java/javax APIs-->
<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener" />
<Listener className="org.apache.catalina.mbeans.GlobalResourcesLifecycleListener" />
<Listener className="org.apache.catalina.core.ThreadLocalLeakPreventionListener" />
<Service name="Catalina">
<Connector port="9000"
scheme="https"
proxyName=""
proxyPort=""
secure="true"
maxThreads="150"
minSpareThreads="25"
connectionTimeout="20000"
enableLookups="false"
maxHttpHeaderSize="8192"
protocol="HTTP/1.1"
useBodyEncodingForURI="true"
redirectPort="8443"
acceptCount="100"
disableUploadTimeout="true"
bindOnInit="false"/>
<Engine name="Catalina" defaultHost="localhost">
<Host name="localhost" appBase="webapps" unpackWARs="true" autoDeploy="true">
<Context path="" docBase="${catalina.home}/atlassian-jira" reloadable="false" useHttpOnly="true">
<Resource name="UserTransaction" auth="Container" type="javax.transaction.UserTransaction"
factory="org.objectweb.jotm.UserTransactionFactory" jotm.timeout="60"/>
<Manager pathname=""/>
<JarScanner scanManifest="false"/>
</Context>
<!-- Jira security remediation fix - -7/15/2019 -->
<Context path="https://jira.dev.****.com/secure/admin/SendBulkMail!default.jspa" docBase="" >
<Valapp className="org.apache.catalina.valapps.RemoteAddrValapp" deny="*" />
</Context>
</Host>
<Valve className="org.apache.catalina.valves.AccessLogValve"
pattern="%a %{jira.request.id}r %{jira.request.username}r %t "%m %U%q %H" %s %b %D "%{Referer}i
" "%{User-Agent}i" "%{jira.request.assession.id}r""/>
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Above is the server.xml, I'm using where I've placed new context path under Engine. Once I try to restart Jira, Jira wouldn't start and I tried un commenting the new context path, Jira works fine.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
<Context path="https://jira.dev.****.com/secure/admin/SendBulkMail!default.jspa" docBase="" >
<Valapp className="org.apache.catalina.valapps.RemoteAddrValapp" deny="*" />
</Context>
use instead:
<Context path="/secure/admin/SendBulkMail!default.jspa" docBase="" >
<Valapp className="org.apache.catalina.valapps.RemoteAddrValapp" deny="*" />
</Context>
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hey Thomas,
That's a good catch :) It worked for me. I really appreciate your help!
Thank you.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Abhinav,
I had provided few details regarding this here https://community.atlassian.com/t5/Jira-questions/Which-document-must-be-blocked-for-the-Workaround-for-CVE-2019/qaq-p/1128938?utm_source=atlcomm&utm_medium=email&utm_campaign=mentions_reply&utm_content=topic
You can try to follow the same.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hello Anurag,
Thank you very much for your reply. I've tried the same and restarted the instance, but I'm still able to hit this page: https://jira.dev.****.com/secure/admin/SendBulkMail!default.jspa
I thought the expected outcome should be, we shouldn't be able to hit this page which mitigates the security issue, Am I correct?
I really appreciate your help!
Thank you.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.