-
Public Security Vulnerability
-
Resolution: Fixed
-
Low (View bug fix roadmap)
-
8.13.0, 8.20.0, 8.22.0
-
7.2
-
High
-
CVE-2022-26135
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4.
We would like to acknowledge Shubham Shah and Dylan Pindur of Assetnote for finding this vulnerability.
Affected versions:
- versions >= 8.0.0 and < 8.13.22
- 8.14.x
- 8.15.x
- 8.16.x
- 8.17.x
- 8.18.x
- 8.19.x
- 8.20.x < 8.20.10
- 8.22.x < 8.22.4
Fixed versions:
- 8.13.x >= 8.13.22
- 8.20.x >= 8.20.10
- 8.22.x >= 8.22.4
- 9.0.0
- was cloned as
-
JSDSERVER-11840 Full Read SSRF in Mobile Plugin CVE-2022-26135
-
- Published
-
- mentioned in
-
Page Failed to load
-
Page Failed to load
-
Page Failed to load
-
Page Failed to load
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
What if we have this mobile plugin disabled in Jira? Do we still need to apply the patches?