-
Public Security Vulnerability
-
Resolution: Fixed
-
Low (View bug fix roadmap)
-
8.22.0, 8.13.18, 8.20.6
-
7.2
-
High
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented.
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the Email Templates feature.
Affected versions:
- version < 8.13.19,
- 8.14.0 ≤ version < 8.20.7,
- 8.21.0 ≤ version < 8.22.1,
- 8.23.0 ≤ version < 9.0.0
Fixed versions:
- 8.13.19,
- 8.20.7,
- 8.22.1,
- 9.0.0
- relates to
-
JRASERVER-73072 Template Injection in Email Templates leads to code execution on Jira Service Management Server - CVE-2021-43944
-
- Published
-
[JRASERVER-73581] Jira Software Server Template RCE via Email Templates feature
Component/s | New: Security [ 68109 ] |
Labels | Original: advisory advisory-to-release dont-import security | New: advisory advisory-released dont-import security |
Resolution | New: Fixed [ 1 ] | |
Security | Original: Atlassian Staff [ 10750 ] | |
Status | Original: Draft [ 12872 ] | New: Published [ 12873 ] |
Summary | Original: Jira Software Server Template RCE via JNDI related blocklist | New: Jira Software Server Template RCE via Email Templates feature |
Description |
Original:
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented.
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the JNDI related blocklist. *Affected versions:* * version < 8.13.19, * 8.14.0 ≤ version < 8.20.7, * 8.21.0 ≤ version < 8.22.1, * 8.23.0 ≤ version < 9.0.0 *Fixed versions:* - 8.13.19, - 8.20.7, - 8.22.1, - 9.0.0 |
New:
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented.
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the Email Templates feature. *Affected versions:* * version < 8.13.19, * 8.14.0 ≤ version < 8.20.7, * 8.21.0 ≤ version < 8.22.1, * 8.23.0 ≤ version < 9.0.0 *Fixed versions:* - 8.13.19, - 8.20.7, - 8.22.1, - 9.0.0 |
Description |
Original:
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the JNDI related blocklist.
*Affected versions:* * version < 8.13.19, * 8.14.0 ≤ version < 8.20.7, * 8.21.0 ≤ version < 8.22.1, * 8.23.0 ≤ version < 9.0.0 *Fixed versions:* - 8.13.19, - 8.20.7, - 8.22.1, - 9.0.0 |
New:
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented.
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the JNDI related blocklist. *Affected versions:* * version < 8.13.19, * 8.14.0 ≤ version < 8.20.7, * 8.21.0 ≤ version < 8.22.1, * 8.23.0 ≤ version < 9.0.0 *Fixed versions:* - 8.13.19, - 8.20.7, - 8.22.1, - 9.0.0 |
Summary | Original: Jira Software Server Template RCE | New: Jira Software Server Template RCE via JNDI related blocklist |
Description |
Original:
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the JNDI related blocklist.
*Affected versions:* * version < 8.13.19, * 8.14.0 ≤ version < 8.20.7, * 8.21.0 ≤ version < 8.22.1, * 8.23.0 ≤ version < 9.0.0 *Fixed versions:* - 8.13.19, 8.20.7, 8.22.1, 9.0.0 |
New:
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the JNDI related blocklist.
*Affected versions:* * version < 8.13.19, * 8.14.0 ≤ version < 8.20.7, * 8.21.0 ≤ version < 8.22.1, * 8.23.0 ≤ version < 9.0.0 *Fixed versions:* - 8.13.19, - 8.20.7, - 8.22.1, - 9.0.0 |
Description |
Original:
Affected versions of Atlassian Jira Server allow remote attackers to execute arbitrary code via a Remote Code Execution (RCE) vulnerability in {component}. |
New:
Affected versions of Atlassian Jira Software Server and Data Center allow a system administrator to execute arbitrary code via a remote code execution in the JNDI related blocklist.
*Affected versions:* * version < 8.13.19, * 8.14.0 ≤ version < 8.20.7, * 8.21.0 ≤ version < 8.22.1, * 8.23.0 ≤ version < 9.0.0 *Fixed versions:* - 8.13.19, 8.20.7, 8.22.1, 9.0.0 |
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 7.2 => High severity
Exploitability Metrics
Scope Metric
Impact Metrics
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H