JIra 6.4.13 application vulnerabilities


We are using JIRA 6.4.13 version. The following vulnerabilities are detected in APP SCAN report and marked as medium.  We need to address it.




  1. Application error message: This page contains an error/warning message that may disclose sensitive information
  2. HTML form without CSRF protection: Check if this form requires CSRF protection and implement CSRF
  3. Slow HTTP Denial of Service Attack: Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol. If an HTTP request is not complete, server keeps its resources busy waiting state. If many resources busy, this creates a denial of service.
  4. Clickjacking: X-Frame-Options header missing: Configure your web server to include an X-Frame-Options header
  5. Cookies without HttpOnly flag set: You should set the HTTPOnly flag for this cookie


1 answer

1 vote

2-5 appear to be a function of the web-server you're using, rather than JIRA itself - you'll need to look at that.

Point 1 - not a lot we can do without knowing which error it is.


Suggest an answer

Log in or Join to answer
Community showcase
Emilee Spencer
Published yesterday in Marketplace Apps

Marketplace Spotlight: DeepAffects

Hello Atlassian Community! My name is Emilee, and I’m a Product Marketing Manager for the Marketplace team. Starting with this post, I'm kicking off a monthly series of Spotlights to highlight Ma...

41 views 0 3
Read article

Atlassian User Groups

Connect with like-minded Atlassian users at free events near you!

Find a group

Connect with like-minded Atlassian users at free events near you!

Find my local user group

Unfortunately there are no AUG chapters near you at the moment.

Start an AUG

You're one step closer to meeting fellow Atlassian users at your local meet up. Learn more about AUGs

Groups near you
Atlassian Team Tour

Join us on the Team Tour

We're bringing product updates and pro tips on teamwork to ten cities around the world.

Save your spot