-
Public Security Vulnerability
-
Resolution: Fixed
-
Low
-
4.8.8
-
None
-
6.1
-
Medium
-
CVE-2021-43956
The jQuery deserialize library in Fisheye and Crucible before version 4.8.9 allowed remote attackers to to inject arbitrary HTML and/or JavaScript via a prototype pollution vulnerability.
Affected versions:
- version < 4.8.9
Fixed versions:
- 4.8.9
- relates to
-
FE-7395 CVE-2021-43956: Javascript Prototype Pollution in the jQuery deserialize library
-
- Published
-
[CRUC-8531] CVE-2021-43956: Javascript Prototype Pollution in the jQuery deserialize library
Labels | Original: CVE-2021-43956 advisory advisory-released dont-import release-48x release-490 security | New: CVE-2021-43956 advisory advisory-released dont-import release-48x security |
Labels | Original: CVE-2021-43956 advisory advisory-released dont-import release-490 security | New: CVE-2021-43956 advisory advisory-released dont-import release-48x release-490 security |
Labels | Original: CVE-2021-43956 advisory advisory-released dont-import security | New: CVE-2021-43956 advisory advisory-released dont-import release-490 security |
CVE ID | New: CVE-2021-43956 |
Labels | Original: CVE-2021-43956 advisory advisory-to-release dont-import security | New: CVE-2021-43956 advisory advisory-released dont-import security |
Resolution | New: Fixed [ 1 ] | |
Security | Original: Atlassian Staff [ 10750 ] | |
Status | Original: Draft [ 12872 ] | New: Published [ 12873 ] |
Summary | Original: CVE-2021-43956: Javascript Prototype Pollution - FishEye - Crucible | New: CVE-2021-43956: Javascript Prototype Pollution in the jQuery deserialize library |
Labels | Original: advisory advisory-to-release dont-import security | New: CVE-2021-43956 advisory advisory-to-release dont-import security |
Summary | Original: Javascript Prototype Pollution - FishEye - Crucible | New: CVE-2021-43956: Javascript Prototype Pollution - FishEye - Crucible |
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 6.1 => Medium severity
Exploitability Metrics
Scope Metric
Impact Metrics
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N