9.8
CVE-2019-11581
- EPSS 94.36%
- Veröffentlicht 09.08.2019 20:15:11
- Zuletzt bearbeitet 24.10.2025 13:39:05
- Quelle security@atlassian.com
- CVE-Watchlists
- Unerledigt
There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Atlassian ≫ Jira Server Version >= 4.4 < 7.6.14
Atlassian ≫ Jira Server Version >= 7.7.0 < 7.13.5
Atlassian ≫ Jira Server Version >= 8.0.0 < 8.0.3
Atlassian ≫ Jira Server Version >= 8.1.0 < 8.1.2
Atlassian ≫ Jira Server Version >= 8.2.0 < 8.2.3
07.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Atlassian Jira Server and Data Center Server-Side Template Injection Vulnerability
SchwachstelleAtlassian Jira Server and Data Center contain a server-side template injection vulnerability which can allow for remote code execution.
BeschreibungApply updates per vendor instructions.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 94.36% | 1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.