CVE-2021-41305

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. The affected versions are before version 8.13.12..
References
Link Resource
https://jira.atlassian.com/browse/JRASERVER-72813 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*

History

03 May 2022, 16:04

Type Values Removed Values Added
CWE CWE-200 CWE-639

27 Oct 2021, 21:21

Type Values Removed Values Added
CPE cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
CWE CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (MISC) https://jira.atlassian.com/browse/JRASERVER-72813 - (MISC) https://jira.atlassian.com/browse/JRASERVER-72813 - Issue Tracking, Patch, Vendor Advisory

26 Oct 2021, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-26 05:15

Updated : 2024-10-09 17:35


NVD link : CVE-2021-41305

Mitre link : CVE-2021-41305

CVE.ORG link : CVE-2021-41305


JSON object : View

Products Affected

atlassian

  • jira
  • jira_software_data_center
CWE
CWE-639

Authorization Bypass Through User-Controlled Key