-
Public Security Vulnerability
-
Resolution: Fixed
-
Low
-
8.13.0, 8.20.0, 8.22.0
-
7.2
-
High
-
CVE-2022-26135
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4.
We would like to acknowledge Shubham Shah and Dylan Pindur of Assetnote for finding this vulnerability.
Affected versions:
- versions >= 8.0.0 and < 8.13.22
- 8.14.x
- 8.15.x
- 8.16.x
- 8.17.x
- 8.18.x
- 8.19.x
- 8.20.x < 8.20.10
- 8.22.x < 8.22.4
Fixed versions:
- 8.13.x >= 8.13.22
- 8.20.x >= 8.20.10
- 8.22.x >= 8.22.4
- 9.0.0
- was cloned as
-
JSDSERVER-11840 Full Read SSRF in Mobile Plugin CVE-2022-26135
- Published
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...