Atlassian Confluence JIRA Stored Cross-Site Scripting Vulnerability


Description   (:A cross-site scripting vulnerability has been identified in Atlassian JIRA..:A remote attacker could exploit it by inciting his victim to follow a specially crafted URL in order to execute arbitrary JavaScript/HTML code.::The vulnerability is due to insufficient validation of input user parameters in pages carrying attached files.::A proof of concept is available.)
     
Vulnerable Products   Vulnerable Software:
Confluence (Atlassian) - 5.10.0, 5.10.1, 5.10.2, 5.10.3, 5.10.4, 5.10.5
     
Solution   Versions 5.10.6 of Confluence JIRA fix this vulnerability.
     
CVE   CVE-2016-6283
     
References   - Full Disclosure: Persisted Cross-Site Scripting (XSS) in Confluence Jira Software
http://seclists.org/fulldisclosure/2017/Jan/3
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2017-01-03 

 Target Type 
Server 

 Possible exploit 
Remote