Summary
Detail | |||
---|---|---|---|
Vendor | Atlassian | First view | 2008-01-03 |
Product | Jira | Last view | 2022-02-28 |
Version | 3.9 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:atlassian:jira |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.8 | 2022-02-28 | CVE-2021-43945 | Affected versions of Atlassian Jira Server and Data Center allow remote attackers with Roadmaps Administrator permissions to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint. The affected versions are before version 8.20.3. |
4.3 | 2022-02-15 | CVE-2021-43953 | Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to toggle the Thread Contention and CPU monitoring settings via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/ViewInstrumentation.jspa endpoint. The affected versions are before version 8.13.16, and from version 8.14.0 before 8.20.5. |
7.2 | 2022-01-06 | CVE-2021-43947 | Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to execute arbitrary code via a Remote Code Execution (RCE) vulnerability in the Email Templates feature. This issue bypasses the fix of https://jira.atlassian.com/browse/JSDSERVER-8665. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3. |
7.5 | 2021-11-03 | CVE-2021-41312 | Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1. |
6.5 | 2021-10-26 | CVE-2021-41308 | Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1. |
7.5 | 2021-10-26 | CVE-2021-41307 | Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view the names of private projects and private filters via an Insecure Direct Object References (IDOR) vulnerability in the Workload Pie Chart Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0. |
7.5 | 2021-10-26 | CVE-2021-41306 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0. |
7.5 | 2021-10-26 | CVE-2021-41305 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. The affected versions are before version 8.13.12.. |
6.1 | 2021-10-26 | CVE-2021-41304 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the /secure/admin/ImporterFinishedPage.jspa error message. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.2. |
5.3 | 2021-10-21 | CVE-2021-39127 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to the query component JQL endpoint via a Broken Access Control vulnerability (BAC) vulnerability. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.1. |
5.3 | 2021-09-14 | CVE-2021-39125 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to discover the usernames of users via an enumeration vulnerability in the password reset page. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.1. |
4.3 | 2021-09-14 | CVE-2021-39124 | The Cross-Site Request Forgery (CSRF) failure retry feature of Atlassian Jira Server and Data Center before version 8.16.0 allows remote attackers who are able to trick a user into retrying a request to bypass CSRF protection and replay a crafted request. |
7.5 | 2021-09-14 | CVE-2021-39123 | Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the /rest/gadget/1.0/createdVsResolved/generate endpoint. The affected versions are before version 8.16.0. |
5.3 | 2021-09-14 | CVE-2021-39118 | Affected versions of Atlassian Jira Server and Data Center allow remote attackers to discover the usernames and full names of users via an enumeration vulnerability in the /rest/api/1.0/render endpoint. The affected versions are before version 8.19.0. |
5.3 | 2021-09-14 | CVE-2019-20101 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view whitelist rules via a Broken Access Control vulnerability in the /rest/whitelist/ |
5.3 | 2021-09-08 | CVE-2021-39122 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view users' emails via an Information Disclosure vulnerability in the /rest/api/2/search endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1. |
4.3 | 2021-09-08 | CVE-2021-39121 | Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to enumerate the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint. The affected versions are before version 8.5.18, from version 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2. |
5.3 | 2021-09-01 | CVE-2021-39119 | Affected versions of Atlassian Jira Server and Data Center allow users who have watched an issue to continue receiving updates on the issue even after their Jira account is revoked, via a Broken Access Control vulnerability in the issue notification feature. The affected versions are before version 8.19.0. |
4.8 | 2021-08-30 | CVE-2021-39117 | The AssociateFieldToScreens page in Atlassian Jira Server and Data Center before version 8.18.0 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability via the name of a custom field. |
7.5 | 2021-08-30 | CVE-2021-39113 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to continue to view cached content even after losing permissions, via a Broken Access Control vulnerability in the allowlist feature. The affected versions are before version 8.13.9, and from version 8.14.0 before 8.18.0. |
6.1 | 2021-08-30 | CVE-2021-39111 | The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field. |
4.8 | 2021-08-25 | CVE-2021-39112 | Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1. |
8.8 | 2021-08-02 | CVE-2017-18113 | The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 allows remote attackers who can trick a system administrator to import their malicious workflow to execute arbitrary code via a Remote Code Execution (RCE) vulnerability. The vulnerability allowed for various problematic OSWorkflow classes to be used as part of workflows. The fix for this issue blocks usage of unsafe conditions, validators, functions and registers that are build-in into OSWorkflow library and other Jira dependencies. Atlassian-made functions or functions provided by 3rd party plugins are not affected by this fix. |
5.4 | 2021-07-20 | CVE-2021-26083 | Export HTML Report in Atlassian Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability. |
5.4 | 2021-07-20 | CVE-2021-26082 | The XML Export in Atlassian Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.17.0 allows remote attackers to inject arbitrary HTML or JavaScript via a stored cross site scripting vulnerability. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
47% (42) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
13% (12) | CWE-352 | Cross-Site Request Forgery (CSRF) |
5% (5) | CWE-639 | Access Control Bypass Through User-Controlled Key |
5% (5) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
4% (4) | CWE-287 | Improper Authentication |
4% (4) | CWE-200 | Information Exposure |
3% (3) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
2% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
2% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (1) | CWE-613 | Insufficient Session Expiration |
1% (1) | CWE-502 | Deserialization of Untrusted Data |
1% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (1) | CWE-306 | Missing Authentication for Critical Function |
1% (1) | CWE-276 | Incorrect Default Permissions |
1% (1) | CWE-269 | Improper Privilege Management |
1% (1) | CWE-203 | Information Exposure Through Discrepancy |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
52707 | Atlassian JIRA Enterprise Edition Webwork 1 Framework Dynamic URL Transformat... |
42770 | Atlassian JIRA Enterprise Edition Setup Wizard Permission Weakness |
42769 | Atlassian JIRA Enterprise Edition Crafted filter ID Arbitrary User Shared Fil... |
42768 | Atlassian JIRA Enterprise Edition 500page.jsp Error Message XSS |
OpenVAS Exploits
id | Description |
---|---|
2012-07-11 | Name : Atlassian Crowd XML Parsing Denial of Service Vulnerability File : nvt/gb_atlassian_crowd_53595.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-10-01 | Atlassian Jira ContactAdministrators and SendBulkMail template injection remo... RuleID : 51318 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Atlassian Jira ContactAdministrators and SendBulkMail template injection remo... RuleID : 51317 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Atlassian Jira ContactAdministrators and SendBulkMail template injection remo... RuleID : 51316 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Atlassian Jira ContactAdministrators and SendBulkMail template injection remo... RuleID : 51315 - Type : SERVER-WEBAPP - Revision : 1 |
2014-11-16 | Jira Issue Collector Plugin directory traversal attempt RuleID : 31698 - Type : SERVER-WEBAPP - Revision : 3 |
2014-11-16 | Jira Issue Collector Plugin directory traversal attempt RuleID : 31697 - Type : SERVER-WEBAPP - Revision : 3 |
2014-11-16 | Jira Issue Collector Plugin directory traversal attempt RuleID : 31696 - Type : SERVER-WEBAPP - Revision : 3 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-02 | Name: The remote web server hosts a web application that is potentially affected by... File: jira_7_13_1.nasl - Type: ACT_GATHER_INFO |
2018-09-07 | Name: The remote web server hosts a web application that is affected by a vulnerabi... File: jira_7_9_3_email_visibility.nasl - Type: ACT_GATHER_INFO |
2018-08-03 | Name: The remote web server hosts a web application that is potentially affected by... File: jira_7_9_3.nasl - Type: ACT_GATHER_INFO |
2018-05-25 | Name: The remote web server hosts a web application that is potentially affected by... File: jira_7_9_2.nasl - Type: ACT_GATHER_INFO |
2014-03-31 | Name: The remote web server hosts a web application that is potentially affected by... File: jira_6_0_4.nasl - Type: ACT_GATHER_INFO |
2014-03-31 | Name: The remote web server hosts a web application that is potentially affected by... File: jira_6_0_5.nasl - Type: ACT_GATHER_INFO |
2012-06-01 | Name: The remote web server hosts a web application that is potentially affected by... File: jira_5_0_1.nasl - Type: ACT_GATHER_INFO |
2008-01-03 | Name: The remote web server hosts a web application that is affected by a cross-sit... File: jira_3_12_1.nasl - Type: ACT_ATTACK |