-
Public Security Vulnerability
-
Resolution: Fixed
-
Low
-
4.5.0, 4.15.0, 4.13.0
-
None
-
5.4
-
Medium
Jira Service Management Server and Data Center allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability caused by parameter pollution.
Affected versions:
- version < 4.5.13
- 4.13.0 ≤ version < 4.13.5
- 4.15.0 ≤ version < 4.15.1
Fixed versions:
- 4.5.13
- 4.13.5
- 4.15.1
- 4.16.0
- mentioned in
-
Page Failed to load
[JSDSERVER-7250] XSS via parameter pollution
Remote Link | New: This issue links to "Page (Confluence)" [ 590098 ] |
Security | Original: Atlassian Staff [ 10750 ] |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Draft [ 12872 ] | New: Published [ 12873 ] |
Description |
Original:
Jira Service Management Server and Data Center before version 8.5.12, from version 8.6.0 before version 8.13.4, and from version 8.14.0 before version 8.15.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability caused by parameter pollution.
*Affected versions:* * version < 8.5.12 * 8.6.0 ≤ version < 8.13.4 * 8.14.0 ≤ version < 8.15.1 *Fixed versions:* * 8.5.12 * 8.13.4 * 8.15.1 Atlassian would like to credit Peter af Geijerstam for reporting this issue. |
New:
Jira Service Management Server and Data Center allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability caused by parameter pollution.
*Affected versions:* * version < 4.5.13 * 4.13.0 ≤ version < 4.13.5 * 4.15.0 ≤ version < 4.15.1 *Fixed versions:* * 4.5.13 * 4.13.5 * 4.15.1 * 4.16.0 |
Summary | Original: [Jira Service Desk Server] XSS via Prototype Pollution | New: XSS via parameter pollution |
Description |
Original:
This vulnerability affects certain versions of Atlassian Jira Service Management Server. Please describe the impact of the vulnerability here. No known vulnerability could be read off of the parent. |
New:
Jira Service Management Server and Data Center before version 8.5.12, from version 8.6.0 before version 8.13.4, and from version 8.14.0 before version 8.15.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability caused by parameter pollution.
*Affected versions:* * version < 8.5.12 * 8.6.0 ≤ version < 8.13.4 * 8.14.0 ≤ version < 8.15.1 *Fixed versions:* * 8.5.12 * 8.13.4 * 8.15.1 Atlassian would like to credit Peter af Geijerstam for reporting this issue. |
Labels | New: advisory advisory-to-release dont-import security |
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 7.1 => High severity
Exploitability Metrics
Scope Metric
Impact Metrics
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N