Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. The affected versions are before version 8.13.12..
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-72813 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 May 2022, 16:04
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-639 |
27 Oct 2021, 21:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* |
|
CWE | CWE-200 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://jira.atlassian.com/browse/JRASERVER-72813 - Issue Tracking, Patch, Vendor Advisory |
26 Oct 2021, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-26 05:15
Updated : 2024-10-09 17:35
NVD link : CVE-2021-41305
Mitre link : CVE-2021-41305
CVE.ORG link : CVE-2021-41305
JSON object : View
Products Affected
atlassian
- jira
- jira_software_data_center
CWE
CWE-639
Authorization Bypass Through User-Controlled Key