The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a vnd.wap.xhtml+xml content type.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-71113 | Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-71113 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/JRASERVER-71113 - Vendor Advisory |
30 Mar 2022, 13:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* |
25 Mar 2022, 18:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* |
Information
Published : 2020-07-01 02:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4024
Mitre link : CVE-2020-4024
CVE.ORG link : CVE-2020-4024
JSON object : View
Products Affected
atlassian
- jira
- jira_server
- jira_data_center
- jira_software_data_center
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')