Jackson JSON library vulnerability CVE-2017-15095

A vulnerability CVE-2017-15095 exists in the Jackson JSON library versions prior to 2.9.2. The recommended solution has been made to upgrade to Jackson 2.9.3.

We are currently running Jira v7.4.3#74005

Here are some of the .jar files that have been pointed out as needed to be remediation.

jackson-databind-2.3.2.jar

jackson-annotations-2.3.0.jar

jackson-core-2.3.2.jar

jackson-mapper-asl-1.9.13-atlassian-1.jar

I'm looking for remediation steps for CVE-2017-15095  but has been unsuccessful in finding any.

1 answer

This widget could not be displayed.

Hi Ethan,


Take a look at the Atlassian Security Advisories page.  Since Jira itself is not using the affected Struts component Jira is not affected by this vulnerability outlined in CVE-2017-15095 on Apache Struts.

Let us know if you have any remaining questions.

Cheers,

Branden

Thank you for the quick response Branden. Would removing these .jar files still allow for JIRA to function without issue for the end user?

JIRA was already installed on the server so I'm not really familiar with the ins and outs of it.  I'm just trying to gather a greater understanding.

Suggest an answer

Log in or Sign up to answer
Community showcase
Published Apr 22, 2018 in Jira Software

How-to setup a secured Jira Software 7.9.0 on Ubuntu 16.04.4 in less than 30 minutes

...PermissionsStartOnly=true User=www-data Group=www-data ExecStart=/opt/jira/bin/startup.sh ExecStop=/opt/jira/bin/shutdown.sh TimeoutStartSec=120 TimeoutStopSec=600 PrivateTmp=true [Install] WantedBy...

1,492 views 10 12
Read article

Atlassian User Groups

Connect with like-minded Atlassian users at free events near you!

Find a group

Connect with like-minded Atlassian users at free events near you!

Find my local user group

Unfortunately there are no AUG chapters near you at the moment.

Start an AUG

You're one step closer to meeting fellow Atlassian users at your local meet up. Learn more about AUGs

Groups near you