-
Bug
-
Resolution: Fixed
-
Medium
-
None
-
None
-
Severity 2 - Major
-
The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup.
- is related to
-
CRUC-8173 XSS in the admin backupprogress action through the filename of a backup - CVE-2017-18091
-
- Closed
-
[FE-7006] XSS in the admin backupprogress action through the filename of a backup - CVE-2017-18091
Workflow | Original: FE-CRUC Bug Workflow [ 2943154 ] | New: JAC Bug Workflow v3 [ 2956318 ] |
Workflow | Original: FECRU Development Workflow - Triage - Restricted [ 2632174 ] | New: FE-CRUC Bug Workflow [ 2943154 ] |
Labels | Original: CVE-2017-18091 advisory advisory-to-release cvss-medium security xss | New: CVE-2017-18091 advisory advisory-released cvss-medium security xss |
Labels | Original: advisory advisory-to-release cvss-medium security xss | New: CVE-2017-18091 advisory advisory-to-release cvss-medium security xss |
Fix Version/s | New: 4.5.0 [ 71891 ] |
Summary | Original: XSS in the admin backupprogress action through the filename of a backup - | New: XSS in the admin backupprogress action through the filename of a backup - CVE-2017-18091 |
Summary | Original: Sanitised security issue 699029c4590e77443708e550db04f7523d92b77cc76f73f08a36ed729fa68eec | New: XSS in the admin backupprogress action through the filename of a backup - |