-
Bug
-
Resolution: Fixed
-
Medium
-
None
-
None
-
Severity 2 - Major
-
The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup.
- relates to
-
FE-7006 XSS in the admin backupprogress action through the filename of a backup - CVE-2017-18091
-
- Closed
-
[CRUC-8173] XSS in the admin backupprogress action through the filename of a backup - CVE-2017-18091
Workflow | Original: FE-CRUC Bug Workflow [ 2939935 ] | New: JAC Bug Workflow v3 [ 2952754 ] |
Workflow | Original: FECRU Development Workflow - Triage - Restricted [ 2632175 ] | New: FE-CRUC Bug Workflow [ 2939935 ] |
Labels | Original: CVE-2017-18091 advisory advisory-to-release cvss-medium security xss | New: CVE-2017-18091 advisory advisory-released cvss-medium security xss |
Labels | Original: advisory advisory-to-release cvss-medium security xss | New: CVE-2017-18091 advisory advisory-to-release cvss-medium security xss |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Needs Triage [ 10030 ] | New: Closed [ 6 ] |
Link | New: This issue is detailed by FECRU-7296 [ FECRU-7296 ] |
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 4.8 => Medium severity
Exploitability Metrics
Scope Metric
Impact Metrics
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N