-
Bug
-
Resolution: Fixed
-
Medium
-
4.8.1
-
Severity 2 - Major
-
The bundled version of Atlassian Navigator Links plugin in Atlassian Fisheye before version 4.8.2 allows remote attackers to enumerate all linked applications, including those that are restricted or otherwise hidden, through an incorrect authorization check. Additional details about the issue in the Atlassian Navigator Links plugin can be found below.
The CustomAppsRestResource list resource in Atlassian Navigator Links before version 3.3.23, from version 4.0.0 before version 4.3.7, from version 5.0.0 before 5.0.1, and from version 5.1.0 before 5.1.1 allows remote attackers to enumerate all linked applications, including those that are restricted or otherwise hidden, through an incorrect authorization check.
- relates to
-
FE-7299 The bundled version of Atlassian Navigator Links contained an incorrect authorization check - CVE-2020-4026
-
- Closed
-
[CRUC-8485] The bundled version of Atlassian Navigator Links contained an incorrect authorization check - CVE-2020-4026
Labels | Original: CVE-2020-4026 advisory advisory-released cvss-medium release-48x release-490 security vulnerable-components | New: CVE-2020-4026 advisory advisory-released cvss-medium release-48x security vulnerable-components |
Labels | Original: CVE-2020-4026 advisory advisory-released cvss-medium release-490 security vulnerable-components | New: CVE-2020-4026 advisory advisory-released cvss-medium release-48x release-490 security vulnerable-components |
Labels | Original: CVE-2020-4026 advisory advisory-released cvss-medium security vulnerable-components | New: CVE-2020-4026 advisory advisory-released cvss-medium release-490 security vulnerable-components |
Fix Version/s | Original: 4.9.0 [ 90696 ] |
Labels | Original: CVE-2020-4026 advisory advisory-to-release cvss-medium security vulnerable-components | New: CVE-2020-4026 advisory advisory-released cvss-medium security vulnerable-components |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Needs Triage [ 10030 ] | New: Closed [ 6 ] |
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 4.3 => Medium severity
Exploitability Metrics
Scope Metric
Impact Metrics
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N