-
Bug
-
Resolution: Fixed
-
Medium
-
true
The atlassian-http library, as used in various Atlassian products, before version 2.0.2 allows remote attackers to spoof web content in the Mozilla Firefox Browser through uploaded files that have a content-type of application/mathml+xml.
- is related to
-
BAM-19824 The bundled atlassian-http library had a content spoofing issue - CVE-2017-18103
-
- Closed
-
-
BSERV-10740 The bundled atlassian-http library had a content spoofing issue - CVE-2017-18103
-
- Closed
-
-
CONFSERVER-54906 Content spoofing in the attachment resource in the Firefox browser - CVE-2018-13389
-
- Closed
-
-
CONFSERVER-55328 The bundled atlassian-http library had a content spoofing issue - CVE-2017-18103
-
- Closed
-
-
CRUC-8214 The bundled atlassian-http library had a content spoofing issue - CVE-2017-18103
-
- Closed
-
-
FE-7068 The bundled atlassian-http library had a content spoofing issue - CVE-2017-18103
-
- Closed
-
-
JRASERVER-67612 The bundled atlassian-http library had a content spoofing issue - CVE-2017-18103
-
- Closed
-
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 4.7 => Medium severity
Exploitability Metrics
Scope Metric
Impact Metrics
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N