The labels widget gadget in Atlassian Jira before version 7.6.11 and from version 7.7.0 before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the rendering of retrieved content from a url location that could be manipulated by the up_projectid widget preference setting.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/107023 | Third Party Advisory VDB Entry |
| https://jira.atlassian.com/browse/JRASERVER-68614 | Vendor Advisory |
| http://www.securityfocus.com/bid/107023 | Third Party Advisory VDB Entry |
| https://jira.atlassian.com/browse/JRASERVER-68614 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/107023 - Third Party Advisory, VDB Entry | |
| References | () https://jira.atlassian.com/browse/JRASERVER-68614 - Vendor Advisory |
25 Mar 2022, 17:22
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* |
Information
Published : 2019-02-13 18:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20232
Mitre link : CVE-2018-20232
CVE.ORG link : CVE-2018-20232
JSON object : View
Products Affected
atlassian
- jira_server
- jira
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
