CVE-2017-18113
JIRA vulnerability analysis and mitigation

Overview

The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 contains a Remote Code Execution (RCE) vulnerability identified as CVE-2017-18113. The vulnerability was discovered and disclosed in August 2021, affecting Jira versions from 7.2.0 onwards. This security flaw allows remote attackers to execute arbitrary code if they can convince a system administrator to import a malicious workflow (Jira Advisory).

Technical details

The vulnerability exists in the DefaultOSWorkflowConfigurator class and allows for various problematic OSWorkflow classes to be used as part of workflows. The issue has a CVSS score of 8.3 (High severity) and is classified under CWE-94 (Improper Control of Generation of Code). The vulnerability specifically relates to unsafe conditions, validators, functions, and registers that are built into the OSWorkflow library and other Jira dependencies (Jira Advisory).

Impact

If successfully exploited, the vulnerability allows remote attackers to execute arbitrary code on the affected system. This could potentially lead to complete system compromise, as the code would execute with the same privileges as the Jira application (NVD).

Mitigation and workarounds

The vulnerability was fully patched in Jira version 8.18.1 and 8.19.0. Workarounds are available in versions 8.5.19+ and 8.13.11+ by enabling the dark feature flag: com.atlassian.jira.security.LegacyJiraTypeResolver.block.unknown.functions.enabled. For Jira 8.18.1 and above, administrators can optionally disable the protection using the dark feature flag: com.atlassian.jira.security.LegacyJiraTypeResolver.WARN_ONLY.enabled (Jira Advisory).

Additional resources


SourceThis report was generated using AI

Related JIRA vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-1471CRITICAL9.8
  • IBM Db2IBM Db2
  • stargate
NoYesDec 01, 2022
CVE-2025-22167HIGH8.7
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesOct 22, 2025
CVE-2025-22157HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesMay 20, 2025
CVE-2022-36799HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesAug 01, 2022
CVE-2024-21685MEDIUM6.5
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesJun 18, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management