Jira Path Traversal Vulnerability

MEDIUM (6.5) No Patch (58 days)

Threat Intelligence

Low Risk
EPSS Score: 0.06% chance of exploitation (percentile: 19%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Jira Software Data Center and Server is a popular project management tool used by many organizations. This vulnerability allows an attacker to modify any filesystem path writable by the Jira JVM process, potentially leading to arbitrary code execution and data tampering.

Am I affected?

You're affected if you use Jira Software Data Center and Server versions 9.12.0, 10.3.0, or 11.0.0. To check if your instance is vulnerable, run the following command:

find / -name "jira*.war" 2>/dev/null

Note: This vulnerability does not affect Jira Service Management Cloud.

Affected Packages

maven: org.atlassian.jira:jira-core

Affected Products

Atlassian / Jira Software Data Center and Server

How to fix

To fix this vulnerability, upgrade to a supported fixed version:
- Jira Software Data Center and Server 9.12: Upgrade to a release greater than or equal to 9.12.28
- Jira Software Data Center and Server 10.3: Upgrade to a release greater than or equal to 10.3.12
- Jira Software Data Center and Server 11.0: Upgrade to a release greater than or equal to 11.1.0

Immediate mitigations:
- Restrict network access to your Jira instance (firewall it from the public internet)
- Audit admin account activity for suspicious access patterns
- Monitor for unauthorized token creation