Uploaded image for project: 'Jira Service Management Data Center'
  1. Jira Service Management Data Center
  2. JSDSERVER-10980

Stored XSS in "Object Schema" field of /secure/admin/InsightDefaultCustomFieldConfig.jspa - CVE-2021-43943

    • 7.6
    • High
    • CVE-2021-43943

      Affected versions of Atlassian Jira Service Management Server and Data Center allow attackers with administrator privileges to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the "Object Schema" field of /secure/admin/InsightDefaultCustomFieldConfig.jspa.

      The affected versions are before version 4.21.0.

      Affected versions:

      • version < 4.21.0

      Fixed versions:

      • 4.21.0

          Form Name

            [JSDSERVER-10980] Stored XSS in "Object Schema" field of /secure/admin/InsightDefaultCustomFieldConfig.jspa - CVE-2021-43943

            What is the actual status on LTS fix?

            Neli Steinlein added a comment - What is the actual status on LTS fix?

            Any updates on LTS fix?

            Neli Steinlein added a comment - Any updates on LTS fix?

            At it is not mentioned at all, as always, what about LTS? Is there a rough schedule when to expect this being solved in LTS?

            PS: Please improve your CVE handling in Jira for your customers, please. See JRASERVER-73182.

            Michael Aglas added a comment - At it is not mentioned at all, as always, what about LTS? Is there a rough schedule when to expect this being solved in LTS? PS: Please improve your CVE handling in Jira for your customers, please. See JRASERVER-73182 .

            AB added a comment - - edited

            This is an independent assessment and you should evaluate its applicability to your own IT environment.

            CVSS v3 score: 6.7 => Medium severity

            Exploitability Metrics

            Attack Vector Local
            Attack Complexity Low
            Privileges Required High
            User Interaction None

            Scope Metric

            Scope Changed

            Impact Metrics

            Confidentiality High
            Integrity Low
            Availability None

            https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N

            AB added a comment - - edited This is an independent assessment and you should evaluate its applicability to your own IT environment. CVSS v3 score: 6.7 => Medium severity Exploitability Metrics Attack Vector Local Attack Complexity Low Privileges Required High User Interaction None Scope Metric Scope Changed Impact Metrics Confidentiality High Integrity Low Availability None https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated:
                Resolved: