Show plain JSON{"id": "CVE-2020-36238", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2021-04-01T03:15:13.820", "references": [{"url": "https://jira.atlassian.com/browse/JRASERVER-72249", "tags": ["Patch", "Vendor Advisory"], "source": "security@atlassian.com"}, {"url": "https://jira.atlassian.com/browse/JRASERVER-72249", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security@atlassian.com", "description": [{"lang": "en", "value": "CWE-863"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-862"}]}], "descriptions": [{"lang": "en", "value": "The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check."}, {"lang": "es", "value": "El recurso /rest/api/1.0/render en Jira Server y Data Center anterior a versi\u00f3n 8.5.13, desde versi\u00f3n 8.6.0 anterior a versi\u00f3n 8.13.5 y desde versi\u00f3n 8.14.0 anterior a versi\u00f3n 8.15.1, permite a atacantes an\u00f3nimos remotos determinar si un nombre de usuario es v\u00e1lido o no mediante una falta de comprobaci\u00f3n de permisos."}], "lastModified": "2024-11-21T05:29:07.503", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A455FC63-AF29-4D31-8E11-AA5671D12E06", "versionEndExcluding": "8.5.13"}, {"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA8144D6-FDAF-4B92-BE54-832893AC0A1E", "versionEndExcluding": "8.5.13"}, {"criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26055208-F18D-4FF9-A442-7DD62D80F7E7", "versionEndExcluding": "8.13.5", "versionStartIncluding": "8.6.0"}, {"criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F4C4682-A56A-4BEA-AFD7-6F116FCE8EF9", "versionEndExcluding": "8.15.1", "versionStartIncluding": "8.14.0"}, {"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DF55918-44C7-4DC9-BD66-9FD9BA64A955", "versionEndExcluding": "8.13.5", "versionStartIncluding": "8.6.0"}, {"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C31DC16-F8E3-4261-B539-C251E4BBC584", "versionEndExcluding": "8.15.1", "versionStartIncluding": "8.14.0"}], "operator": "OR"}]}], "sourceIdentifier": "security@atlassian.com"}