Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-71198

Man-in-the-middle in Jira email client - CVE-2020-14168

      The email client in Jira Server and Data Center allows remote attackers to access outgoing emails between a Jira instance and the SMTP server via man-in-the-middle (MITM) vulnerability

      Affected versions:

      • version < 7.13.14
      • 8.5.0 ≤ version < 8.5.5
      • 8.8.0 ≤ version < 8.8.2
      • 8.9.0 ≤ version < 8.9.1

      Fixed versions:

      • 7.13.16
      • 8.5.7
      • 8.8.2
      • 8.9.1
      • 8.10.0

            [JRASERVER-71198] Man-in-the-middle in Jira email client - CVE-2020-14168

            This is an independent assessment and you should evaluate its applicability to your own IT environment.
            CVSS v3 score: 5.3 => Medium severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity Low
            Privileges Required None
            User Interaction None

            Scope Metric

            Scope Unchanged

            Impact Metrics

            Confidentiality Low
            Integrity None
            Availability None

            https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

            Security Metrics Bot added a comment - This is an independent assessment and you should evaluate its applicability to your own IT environment. CVSS v3 score: 5.3 => Medium severity Exploitability Metrics Attack Vector Network Attack Complexity Low Privileges Required None User Interaction None Scope Metric Scope Unchanged Impact Metrics Confidentiality Low Integrity None Availability None https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Affected customers:
              0 This affects my team
              Watchers:
              6 Start watching this issue

                Created:
                Updated:
                Resolved: