FishEye Security Advisory 2015-01-21

Note: As of September 2014, we no longer issue binary bug patches. Instead we create new maintenance releases for the major versions we backport to. Please see our Security Bug fix Policy for more details.

Date of Advisory: 21st January 2015

Product: Atlassian FishEye

脆弱性の概要

This advisory discloses a critical severity security vulnerability that exists in all versions of FishEye up to and including 3.6.1.

  • Customers who have downloaded and installed FishEye should upgrade their existing FishEye installations to fix this vulnerability.

Atlassian is committed to improving product security. The vulnerability listed in this advisory has been discovered internally by Atlassian.

 

OGNL Double Evaluation Vulnerability

深刻度

Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low.

This is an independent assessment and you should evaluate its applicability to your own IT environment.

説明

We have discovered and fixed a vulnerability in our fork of WebWork. Attackers can use this vulnerability to execute Java code of their choice on systems that use this framework. The attacker needs to be able to access the FishEye web interface.

All versions of FishEye up to and including 3.6.1 are affected by this vulnerability. This issue can be tracked here:  FE-5459 - Getting issue details... STATUS

Risk Mitigation

If you are unable to upgrade your FishEye server you can do the following as a temporary workaround:

  • Block access to your FishEye server web interface from untrusted networks, such as the Internet.
  • Block at a reverse proxy or a firewall all requests matching the following regular expression pattern in URI parameters.

    .*(?:%|%25|\$|%24)(?:[{(]|%7B|%28).*(?:[(#]|%28|%23).*(?:[})]|%7D|%29).*

修正

Releases 3.5.5, 3.6.2 (and any subsequent newer releases) are available to fix the vulnerability for versions 3.5 and 3.6 respectively. You can download these releases from:

Upgrade (recommended)

The vulnerabilities and fix versions are described in the sections above.

Atlassian recommend that you upgrade to the latest version. For a full description of the latest version of FishEye, see its release notes.

It is advised that you upgrade to the latest version of FishEye, as there are no longer binary patches made available.

サポート

このアドバイザリに関してご質問や懸念がある場合は、https://support.atlassian.com/ でサポート リクエストを起票してください。

参考

セキュリティ バグの修正ポリシー

As per our new policy, critical security bug fixes will be back ported to major software versions for up to 12 months for FishEye and FishEye.  We will release new maintenance releases for the versions covered by the new policy instead of binary patches.

Binary patches will no longer be released.
セキュリティの問題の重大度レベルAtlassian security advisories include a severity level. This severity level is based on our self-calculated CVSS score for each specific vulnerability. CVSS is an industry standard vulnerability metric.
最終更新日 2016 年 9 月 5 日

この内容はお役に立ちましたか?

はい
いいえ
この記事についてのフィードバックを送信する
Powered by Confluence and Scroll Viewport.