5.3
CVE-2021-26069
- EPSS 2.47%
- Veröffentlicht 22.03.2021 05:15:12
- Zuletzt bearbeitet 21.11.2024 05:55:48
- Quelle security@atlassian.com
- CVE-Watchlists
- Unerledigt
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to download temporary files and enumerate project keys via an Information Disclosure vulnerability in the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Atlassian ≫ Data Center Version < 8.5.11
Atlassian ≫ Data Center Version >= 8.6.0 < 8.13.3
Atlassian ≫ Jira Data Center Version >= 8.14.0 < 8.15.0
Atlassian ≫ Jira Server Version >= 8.6.0 < 8.13.3
Atlassian ≫ Jira Server Version >= 8.14.0 < 8.15.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 2.47% | 0.848 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.