Uploaded image for project: 'Jira Data Center'
  1. Jira Data Center
  2. JRASERVER-73069

Stored XSS on /rest/jpo/1.0/hierarchyConfiguration via issueTypes parameter - CVE-2021-43945

    • 5.9
    • Medium
    • CVE-2021-43945

      Affected versions of Atlassian Jira Server and Data Center allow remote attackers with Roadmaps Administrator permissions to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint.

      The affected versions are before version 8.20.3.

      Affected versions:

      • version < 8.20.3

      Fixed versions:

      • 8.20.3
      • 8.21.0

          Form Name

            [JRASERVER-73069] Stored XSS on /rest/jpo/1.0/hierarchyConfiguration via issueTypes parameter - CVE-2021-43945

            Mandeep Jadon made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 733363 ]
            Cathy S made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 645847 ]
            Nobuyuki Mukai made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 626340 ]
            Security Metrics Bot made changes -
            CVE ID New: CVE-2021-43945
            AB made changes -
            Resolution New: Fixed [ 1 ]
            Security Original: Atlassian Staff [ 10750 ]
            Status Original: Draft [ 12872 ] New: Published [ 12873 ]
            AB made changes -
            Summary Original: Stored XSS on /rest/jpo/1.0/hierarchyConfiguration via issueTypes parameter - CVE registration for this issue is already in progress New: Stored XSS on /rest/jpo/1.0/hierarchyConfiguration via issueTypes parameter - CVE-2021-43945
            AB made changes -
            Description Original: Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint.

            The affected versions are before version 8.20.3.

            *Affected versions:*

             * version < 8.20.3

            *Fixed versions:*

             * 8.20.3
             * 8.21.0
            New: Affected versions of Atlassian Jira Server and Data Center allow remote attackers with Roadmaps Administrator permissions to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint.

            The affected versions are before version 8.20.3.

            *Affected versions:*
             * version < 8.20.3

            *Fixed versions:*
             * 8.20.3
             * 8.21.0
            AB made changes -
            Description Original: Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint.

            The affected versions are before version 8.20.3.

            *Affected versions:*

             * version < 8.20.3

            *Fixed versions:*

             * 8.20.3
             * 8.21.0
            New: Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint.

            The affected versions are before version 8.20.3.

            *Affected versions:*

             * version < 8.20.3

            *Fixed versions:*

             * 8.20.3
             * 8.21.0

            AB added a comment - - edited

            This is an independent assessment and you should evaluate its applicability to your own IT environment.

            CVSS v3 score: 5.9 => Medium severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity Low
            Privileges Required High
            User Interaction Required

            Scope Metric

            Scope Changed

            Impact Metrics

            Confidentiality Low
            Integrity Low
            Availability Low

            https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L

            AB added a comment - - edited This is an independent assessment and you should evaluate its applicability to your own IT environment. CVSS v3 score: 5.9 => Medium severity Exploitability Metrics Attack Vector Network Attack Complexity Low Privileges Required High User Interaction Required Scope Metric Scope Changed Impact Metrics Confidentiality Low Integrity Low Availability Low https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
            AB made changes -
            Summary Original: Stored XSS on /rest/jpo/1.0/hierarchyConfiguration via issueTypes parameter New: Stored XSS on /rest/jpo/1.0/hierarchyConfiguration via issueTypes parameter - CVE registration for this issue is already in progress

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: