Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-11585 : What You Need to Know

Learn about CVE-2019-11585 affecting Jira software by Atlassian. Discover how remote attackers exploit the startup.jsp resource to redirect users, potentially leading to phishing attacks. Take immediate steps to update and secure your system.

Jira software by Atlassian has a vulnerability in the startup.jsp resource, affecting versions 7.13.6, 8.0.0 to 8.2.3, and 8.3.0 to 8.3.2. This flaw enables remote attackers to redirect users to malicious websites, potentially leading to phishing attacks.

Understanding CVE-2019-11585

This CVE involves a security vulnerability in Jira software that allows for URL redirection to untrusted sites, posing a risk of open redirect attacks.

What is CVE-2019-11585?

The vulnerability in Jira software versions 7.13.6, 8.0.0 to 8.2.3, and 8.3.0 to 8.3.2 permits remote attackers to redirect users to different websites, facilitating potential phishing attacks.

The Impact of CVE-2019-11585

The vulnerability can be exploited by malicious actors to trick users into visiting fraudulent websites, increasing the risk of falling victim to phishing attacks.

Technical Details of CVE-2019-11585

This section provides detailed technical information about the CVE.

Vulnerability Description

The startup.jsp resource in Jira versions before 7.13.6, from 8.0.0 to 8.2.3, and from 8.3.0 to 8.3.2 allows remote attackers to redirect users to different websites, potentially facilitating phishing attacks through an open redirect.

Affected Systems and Versions

        Product: Jira
        Vendor: Atlassian
        Versions Affected: 7.13.6, 8.0.0 to 8.2.3, 8.3.0 to 8.3.2

Exploitation Mechanism

The vulnerability can be exploited by remote attackers to redirect users to malicious websites, which can be utilized for launching phishing attacks.

Mitigation and Prevention

Protective measures to address the CVE.

Immediate Steps to Take

        Update Jira software to the latest patched version immediately.
        Educate users about the risks of clicking on unknown links.
        Monitor network traffic for any suspicious activity.

Long-Term Security Practices

        Regularly update and patch software to mitigate known vulnerabilities.
        Implement email filtering to detect and block phishing attempts.

Patching and Updates

        Apply security patches provided by Atlassian promptly to address the vulnerability and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now