JIra 6.4.13 application vulnerabilities


We are using JIRA 6.4.13 version. The following vulnerabilities are detected in APP SCAN report and marked as medium.  We need to address it.




  1. Application error message: This page contains an error/warning message that may disclose sensitive information
  2. HTML form without CSRF protection: Check if this form requires CSRF protection and implement CSRF
  3. Slow HTTP Denial of Service Attack: Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol. If an HTTP request is not complete, server keeps its resources busy waiting state. If many resources busy, this creates a denial of service.
  4. Clickjacking: X-Frame-Options header missing: Configure your web server to include an X-Frame-Options header
  5. Cookies without HttpOnly flag set: You should set the HTTPOnly flag for this cookie


1 answer

1 vote

2-5 appear to be a function of the web-server you're using, rather than JIRA itself - you'll need to look at that.

Point 1 - not a lot we can do without knowing which error it is.


Could you elaborate how you could add CSRF protection to the login form via the webserver, in my case nginx? My understanding was that the application needs to do this.

Suggest an answer

Log in or Sign up to answer
Community showcase
Posted Oct 09, 2018 in Jira Core

How to manage many similar workflows?

I have multiple projects that use variations of the same base workflow. The variations depend on the requirements of the project or issue type. The variations mostly come in the form of new statuses ...

372 views 6 0
Join discussion

Atlassian User Groups

Connect with like-minded Atlassian users at free events near you!

Find a group

Connect with like-minded Atlassian users at free events near you!

Find my local user group

Unfortunately there are no AUG chapters near you at the moment.

Start an AUG

You're one step closer to meeting fellow Atlassian users at your local meet up. Learn more about AUGs

Groups near you