Hi,
Below is the vulnerability report we received.
Summary:
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint.
Platform Affected: [website]
https://vzmdev.atlassian.net
Please provide steps to remediate this vulnerability
JIRA Version Used: 8.13
Hi,
Take a look on this ticket, you will find some workaround.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
I'm afraid this question is utterly unclear.
The reason is you say "Platform Affected: [website] https://vzmdev.atlassian.net" and "Jira Version Used: 8.13" which is nonsense because the site is Jira Cloud which is emphatically not running Jira 8.13 Server/DC.
Which one are you really asking about? Your Cloud site, or a Server install?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Nic,
Sorry i was not clear with the question. We are using Server jira 8.13 and wanted to know the steps to remediate this vulnerability- Information Disclosure vulnerability
Summary:
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint
Thanks,
Krithica
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Ok, so the vzmdev.atlassian.net mention is a complete red-herring and has nothing to do with it.
Go with Mohamed's answer!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.