The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a mixed multipart content type.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-71107 | Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-71107 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/JRASERVER-71107 - Vendor Advisory |
30 Mar 2022, 13:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* |
25 Mar 2022, 18:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* |
Information
Published : 2020-07-01 02:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4022
Mitre link : CVE-2020-4022
CVE.ORG link : CVE-2020-4022
JSON object : View
Products Affected
atlassian
- jira
- jira_server
- jira_data_center
- jira_software_data_center
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')