-
Public Security Vulnerability
-
Resolution: Fixed
-
Low
-
4.13.0, 4.20.0, 4.22.0
-
None
-
7.2
-
High
-
CVE-2022-26135
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
We would like to acknowledge Shubham Shah and Dylan Pindur of Assetnote for finding this vulnerability.
Affected versions:
- versions >= 4.0.0 and < 4.13.22
- 4.14.x
- 4.15.x
- 4.16.x
- 4.17.x
- 4.18.x
- 4.19.x
- 4.20.x < 4.20.10
- 4.22.x < 4.22.4
Fixed versions:
- 4.13.x >= 4.13.22
- 4.20.x >= 4.20.10
- 4.22.x >= 4.22.4
- 5.0.0
Is a customer portal only user considered as an authentified user that could exploit this CVE?