CVE-2019-20100
JIRA vulnerability analysis and mitigation

Overview

The Atlassian Application Links plugin was found to be vulnerable to cross-site request forgery (CSRF), identified as CVE-2019-20100. The vulnerability affects all versions prior to 5.4.21, versions 6.0.0 to 6.0.12, 6.1.0 to 6.1.2, 7.0.0 to 7.0.2, and 7.1.0 to 7.1.3. This plugin is used by Atlassian Jira Server and Data Center versions before 8.7.0 (CVE Details, Tenable Advisory).

Technical details

The vulnerability exists in the application links configuration endpoint '/rest/applinks/3.0/applicationlinkForm/manifest.json'. The CSRF vulnerability could be exploited if an attacker convinces a user with an active WebSudo session and permissions to create application links to click on a crafted link. The vulnerability received a CVSSv2 Base Score of 5.8 (Medium) with a vector of (AV:N/AC:M/Au:N/C:P/I:P/A:N) (Tenable Advisory).

Impact

If successfully exploited, this vulnerability allows attackers to enumerate hosts and open ports on the internal network where the Jira server is present. This could potentially expose sensitive network infrastructure information to unauthorized parties (CVE Details).

Mitigation and workarounds

The recommended mitigation is to upgrade to Jira version 8.7.0 or above. This version includes the necessary security fixes to address the CSRF vulnerability (Tenable Advisory).

Additional resources


SourceThis report was generated using AI

Related JIRA vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-1471CRITICAL9.8
  • IBM Db2IBM Db2
  • prometheus-jmx-exporter-openjdk8
NoYesDec 01, 2022
CVE-2025-22167HIGH8.7
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesOct 22, 2025
CVE-2025-22157HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesMay 20, 2025
CVE-2022-36799HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesAug 01, 2022
CVE-2024-21685MEDIUM6.5
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesJun 18, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management