We have identified and fixed a stored cross-site scripting (XSS) vulnerability in the FishEye user profile. Affected versions are all versions earlier than 2.5.5
XSS vulnerabilities allow an attacker to embed their own JavaScript into a FishEye page. You can read more about XSS attacks at various places on the web, including these:
- cgisecurity.com: http://www.cgisecurity.com/articles/xss-faq.shtml
- The Web Application Security Consortium: http://projects.webappsec.org/Cross-Site+Scripting
This issue is reported in our security advisory on this page:
https://confluence.atlassian.com/x/gAjSEQ
[FE-3797] XSS vulnerability in user's profile display name
Workflow | Original: FE-CRUC Bug Workflow [ 2944370 ] | New: JAC Bug Workflow v3 [ 2958586 ] |
Workflow | Original: FECRU Development Workflow - Triage - Restricted [ 1518279 ] | New: FE-CRUC Bug Workflow [ 2944370 ] |
Workflow | Original: FECRU Development Workflow - Triage [ 940967 ] | New: FECRU Development Workflow - Triage - Restricted [ 1518279 ] |
Labels | Original: advisory security | New: advisory cvss-high security |
Workflow | Original: FECRU Development Workflow (Triage) [ 351454 ] | New: FECRU Development Workflow - Triage [ 940967 ] |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Open [ 1 ] | New: Closed [ 6 ] |
Description |
Original:
We have identified and fixed a stored cross-site scripting (XSS) vulnerability in the FishEye user profile. Affected versions are all versions earlier than 2.5.5
XSS vulnerabilities allow an attacker to embed their own JavaScript into a FishEye page. You can read more about XSS attacks at various places on the web, including these: * cgisecurity.com: http://www.cgisecurity.com/articles/xss-faq.shtml * The Web Application Security Consortium: http://projects.webappsec.org/Cross-Site+Scripting This issue is reported in our security advisory on this page: http://confluence.atlassian.com/x/dQH6Dw |
New:
We have identified and fixed a stored cross-site scripting (XSS) vulnerability in the FishEye user profile. Affected versions are all versions earlier than 2.5.5
XSS vulnerabilities allow an attacker to embed their own JavaScript into a FishEye page. You can read more about XSS attacks at various places on the web, including these: * cgisecurity.com: http://www.cgisecurity.com/articles/xss-faq.shtml * The Web Application Security Consortium: http://projects.webappsec.org/Cross-Site+Scripting This issue is reported in our security advisory on this page: https://confluence.atlassian.com/x/gAjSEQ |
Resolution | Original: Fixed [ 1 ] | |
Status | Original: Closed [ 6 ] | New: Open [ 1 ] |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Needs Triage [ 10030 ] | New: Closed [ 6 ] |
Security | Original: Reporters and Developers [ 10090 ] |