JIra 6.4.13 application vulnerabilities

rajanikanth S June 1, 2016

 

We are using JIRA 6.4.13 version. The following vulnerabilities are detected in APP SCAN report and marked as medium.  We need to address it.

 

 

 

  1. Application error message: This page contains an error/warning message that may disclose sensitive information
  2. HTML form without CSRF protection: Check if this form requires CSRF protection and implement CSRF
  3. Slow HTTP Denial of Service Attack: Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol. If an HTTP request is not complete, server keeps its resources busy waiting state. If many resources busy, this creates a denial of service.
  4. Clickjacking: X-Frame-Options header missing: Configure your web server to include an X-Frame-Options header
  5. Cookies without HttpOnly flag set: You should set the HTTPOnly flag for this cookie

 

1 answer

1 vote
Nic Brough -Adaptavist-
Community Leader
Community Leader
Community Leaders are connectors, ambassadors, and mentors. On the online community, they serve as thought leaders, product experts, and moderators.
June 1, 2016

2-5 appear to be a function of the web-server you're using, rather than JIRA itself - you'll need to look at that.

Point 1 - not a lot we can do without knowing which error it is.

 

Patrick Richter April 5, 2018

Could you elaborate how you could add CSRF protection to the login form via the webserver, in my case nginx? My understanding was that the application needs to do this.

Suggest an answer

Log in or Sign up to answer
TAGS
AUG Leaders

Atlassian Community Events