Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-71184

XSS in WYSIWYG editor via pasted code - CVE-2020-14164

      Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the WYSIWYG editor.

      The affected versions are before 8.5.9, and from version 8.6.0 before 8.8.2.

       

      Affected versions:

      • version < 8.5.9
      • 8.6.0 ≤ version < 8.8.2

      Fixed versions:

      • 8.5.9
      • 8.8.2
      • 8.9.0  

       

            [JRASERVER-71184] XSS in WYSIWYG editor via pasted code - CVE-2020-14164

            Mark Lang made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 509303 ]
            AB made changes -
            Description Original: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the WYSIWYG editor.

            *Affected versions:*
             * version < 8.8.2

            *Fixed versions:*
             * 8.8.2
             * 8.9.0
            New: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the WYSIWYG editor.

            The affected versions are before 8.5.9, and from version 8.6.0 before 8.8.2.

             

            *_Affected versions:_*
             * version < 8.5.9
             * 8.6.0 ≤ version < 8.8.2

            *_Fixed versions:_*
             * 8.5.9
             * 8.8.2
             * 8.9.0  

             

            AB added a comment - - edited

            Hi, this is now fixed in 8.5 Enterprise LTS, in version 8.5.9.

            AB added a comment - - edited Hi, this is now fixed in 8.5 Enterprise LTS, in version 8.5.9.
            AB made changes -
            Summary Original: XSS in Issue - Fields - CVE-2020-14164 New: XSS in WYSIWYG editor via pasted code - CVE-2020-14164
            AB made changes -
            Description Original: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in WYSIWYG editor.

            *Affected versions:*
             * version < 8.8.2

            *Fixed versions:*
             * 8.8.2
             * 8.9.0
            New: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the WYSIWYG editor.

            *Affected versions:*
             * version < 8.8.2

            *Fixed versions:*
             * 8.8.2
             * 8.9.0

            James M added a comment -

            Is this fixed on 8.5 Enterprise LTS?

            James M added a comment - Is this fixed on 8.5 Enterprise LTS?
            set-jac-bot made changes -
            Fixed in Long Term Support Release/s New: [Download 8.5|https://confluence.atlassian.com/enterprise/atlassian-enterprise-releases-948227420.html]
            AB made changes -
            Fix Version/s New: 8.5.9 [ 92910 ]

            We would also like to know the fix version for 8.5? Enterprise. 

            Nancy Orlowski added a comment - We would also like to know the fix version for 8.5? Enterprise. 

            What will the fix version for 8.5 be for this?  I see that it was introduced in 8.5.  We need supported fixes for the Enterprise Release Versions

            Kimberly Deal added a comment - What will the fix version for 8.5 be for this?  I see that it was introduced in 8.5.  We need supported fixes for the Enterprise Release Versions

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Affected customers:
              0 This affects my team
              Watchers:
              10 Start watching this issue

                Created:
                Updated:
                Resolved: