Atlassian.HipChat.Jira.Plugin.Velocity.Template.Code.Injection
Description
This indicates an attack attempt against a Remote Code Execution vulnerability in Atlassian JIRA and HipChat for Atlassian JIRA plugin.
The vulnerability is caused by an improper validation of user supplied data when the vulnerable application handles a maliciously crafted request. An attacker can exploit this to gain access to execute arbitrary code in the context of the vulnerable application via a crafted request.
Affected Products
Atlassian JIRA version 6.4.11 and prior
HipChat For Atlassian JIRA plugin version 6.30.0 and prior
Impact
System Compromise: Remote attacker can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2015-08-26-776650785.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |