-
Public Security Vulnerability
-
Resolution: Fixed
-
Low
-
4.13.0, 4.20.0, 4.22.0
-
None
-
7.2
-
High
-
CVE-2022-26135
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
We would like to acknowledge Shubham Shah and Dylan Pindur of Assetnote for finding this vulnerability.
Affected versions:
- versions >= 4.0.0 and < 4.13.22
- 4.14.x
- 4.15.x
- 4.16.x
- 4.17.x
- 4.18.x
- 4.19.x
- 4.20.x < 4.20.10
- 4.22.x < 4.22.4
Fixed versions:
- 4.13.x >= 4.13.22
- 4.20.x >= 4.20.10
- 4.22.x >= 4.22.4
- 5.0.0
[JSDSERVER-11840] Full Read SSRF in Mobile Plugin CVE-2022-26135
Remote Link | New: This issue links to "Page (Confluence)" [ 847721 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 846205 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 809240 ] |
Labels | Original: advisory advisory-released dont-import hot-jira-fixed security 🔢✅ | New: advisory advisory-released dont-import security 🔢✅ |
CVE ID | New: CVE-2022-26135 |
Comment | [ How can we resolve CVE-2022-26135 this CVE issue? ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 657789 ] |
Labels | Original: advisory advisory-released dont-import security 🔢✅ | New: advisory advisory-released dont-import hot-jira-fixed security 🔢✅ |
Remote Link | New: This issue links to "Page (Confluence)" [ 657775 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 657578 ] |