Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-72715

Project key enumeration via the /rest/api/latest/projectvalidate/key endpoint - CVE-2021-39121

    • 4.3
    • Medium
    • CVE-2021-39121

      Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to enumerate the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint.

      The affected versions are before version 8.5.18, from version 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2.

      *Affected versions:*

      • version < 8.5.18
      • 8.6.0 ≤ version < 8.13.10
      • 8.14.0 ≤ version < 8.18.2

      *Fixed versions:*

      • 8.5.18
      • 8.13.10
      • 8.18.2

            [JRASERVER-72715] Project key enumeration via the /rest/api/latest/projectvalidate/key endpoint - CVE-2021-39121

            Security Metrics Bot made changes -
            CVE ID New: CVE-2021-39121
            David Black made changes -
            Labels Original: CVE-2021-39121 advisory advisory-to-release dont-import security New: CVE-2021-39121 advisory advisory-released dont-import security
            AB made changes -
            Security Original: Atlassian Staff [ 10750 ]
            AB made changes -
            Resolution New: Fixed [ 1 ]
            Status Original: Draft [ 12872 ] New: Published [ 12873 ]
            AB made changes -
            Labels Original: advisory advisory-to-release dont-import security New: CVE-2021-39121 advisory advisory-to-release dont-import security
            AB made changes -
            Summary Original: Project key enumeration via the /rest/api/latest/projectvalidate/key endpoint - CVE is in progress being registered New: Project key enumeration via the /rest/api/latest/projectvalidate/key endpoint - CVE-2021-39121
            AB made changes -
            Description Original: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint.

            The affected versions are before version 8.5.18, from version 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2.

            **Affected versions:**

             * version < 8.5.18
             * 8.6.0 ≤ version < 8.13.10
             * 8.14.0 ≤ version < 8.18.2

            **Fixed versions:**

             * 8.5.18
             * 8.13.10
             * 8.18.2
            New: Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to enumerate the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint.

            The affected versions are before version 8.5.18, from version 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2.

            **Affected versions:**

             * version < 8.5.18
             * 8.6.0 ≤ version < 8.13.10
             * 8.14.0 ≤ version < 8.18.2

            **Fixed versions:**

             * 8.5.18
             * 8.13.10
             * 8.18.2
            Brian Adeloye (Inactive) made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 576814 ]
            AB made changes -
            Summary Original: Project key enumeration via the /rest/api/latest/projectvalidate/key endpoint - CVE-in-progress New: Project key enumeration via the /rest/api/latest/projectvalidate/key endpoint - CVE is in progress being registered

            AB added a comment - - edited

            This is an independent assessment and you should evaluate its applicability to your own IT environment.

            CVSS v3 score: 4.3 => Medium severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity Low
            Privileges Required Low
            User Interaction None

            Scope Metric

            Scope Unchanged

            Impact Metrics

            Confidentiality Low
            Integrity None
            Availability None

            https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

            AB added a comment - - edited This is an independent assessment and you should evaluate its applicability to your own IT environment. CVSS v3 score: 4.3 => Medium severity Exploitability Metrics Attack Vector Network Attack Complexity Low Privileges Required Low User Interaction None Scope Metric Scope Unchanged Impact Metrics Confidentiality Low Integrity None Availability None https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: