We have identified and fixed a stored cross-site scripting (XSS) vulnerability in the FishEye user profile. Affected versions are all versions earlier than 2.5.5
XSS vulnerabilities potentially allow an attacker to embed their own JavaScript into a Confluence page. You can read more about XSS attacks at various places on the web, including these:
- cgisecurity.com: http://www.cgisecurity.com/articles/xss-faq.shtml
- The Web Application Security Consortium: http://projects.webappsec.org/Cross-Site+Scripting
This issue is reported in our security advisory on this page:
https://confluence.atlassian.com/x/gAjSEQ
[FE-3798] XSS vulnerability in a user's comment
Workflow | Original: FE-CRUC Bug Workflow [ 2942517 ] | New: JAC Bug Workflow v3 [ 2958274 ] |
Workflow | Original: FECRU Development Workflow - Triage - Restricted [ 1515339 ] | New: FE-CRUC Bug Workflow [ 2942517 ] |
Comment |
[ nice work. keep it up for any query related to support number visit our website.
[http://supportnumbers.net|http://supportnumbers.net/] ] |
Workflow | Original: FECRU Development Workflow - Triage [ 940965 ] | New: FECRU Development Workflow - Triage - Restricted [ 1515339 ] |
Labels | Original: advisory security | New: advisory cvss-high security |
Workflow | Original: FECRU Development Workflow (Triage) [ 351455 ] | New: FECRU Development Workflow - Triage [ 940965 ] |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Open [ 1 ] | New: Closed [ 6 ] |
Description |
Original:
We have identified and fixed a stored cross-site scripting (XSS) vulnerability in the FishEye user profile. Affected versions are all versions earlier than 2.5.5
XSS vulnerabilities potentially allow an attacker to embed their own JavaScript into a Confluence page. You can read more about XSS attacks at various places on the web, including these: * cgisecurity.com: http://www.cgisecurity.com/articles/xss-faq.shtml * The Web Application Security Consortium: http://projects.webappsec.org/Cross-Site+Scripting This issue is reported in our security advisory on this page: http://confluence.atlassian.com/x/dQH6Dw |
New:
We have identified and fixed a stored cross-site scripting (XSS) vulnerability in the FishEye user profile. Affected versions are all versions earlier than 2.5.5
XSS vulnerabilities potentially allow an attacker to embed their own JavaScript into a Confluence page. You can read more about XSS attacks at various places on the web, including these: * cgisecurity.com: http://www.cgisecurity.com/articles/xss-faq.shtml * The Web Application Security Consortium: http://projects.webappsec.org/Cross-Site+Scripting This issue is reported in our security advisory on this page: https://confluence.atlassian.com/x/gAjSEQ |
Resolution | Original: Fixed [ 1 ] | |
Status | Original: Closed [ 6 ] | New: Open [ 1 ] |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Needs Triage [ 10030 ] | New: Closed [ 6 ] |