-
Bug
-
Resolution: Fixed
-
Medium
-
6.2.4
-
Severity 2 - Major
-
The editinword resource in Atlassian Confluence Server before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the contents of an uploaded file.
[CONFSERVER-54903] XSS in the editinword resource through the contents of an uploaded file - CVE-2017-18083
Workflow | Original: JAC Bug Workflow v3 [ 2885287 ] | New: CONFSERVER Bug Workflow v4 [ 2996027 ] |
Workflow | Original: JAC Bug Workflow v2 [ 2790718 ] | New: JAC Bug Workflow v3 [ 2885287 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Workflow | Original: JAC Bug Workflow [ 2737140 ] | New: JAC Bug Workflow v2 [ 2790718 ] |
Symptom Severity | Original: Major [ 14431 ] | New: Severity 2 - Major [ 15831 ] |
Workflow | Original: Confluence Workflow - Public Facing - Restricted v5 - TEMP [ 2594759 ] | New: JAC Bug Workflow [ 2737140 ] |
Labels | Original: advisory advisory-to-release bugbounty cvss-medium loyalty security sxss xss | New: advisory advisory-released bugbounty cvss-medium loyalty security sxss xss |
Security | Original: Atlassian Staff [ 10750 ] |
Priority | Original: Low [ 4 ] | New: Medium [ 3 ] |
Summary | Original: Sanitised security issue 00a46a85e90a43d5125f3325eebf3df920078955b1ba61f9ce1579fc0e1a2a34 | New: XSS in the editinword resource through the contents of an uploaded file - CVE-2017-18083 |
Description | Original: Component in Atlassian Confluence Server from version 6.2.4 before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in VULN_INFO. | New: The editinword resource in Atlassian Confluence Server before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the contents of an uploaded file. |