9.8

CVE-2022-26136

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AtlassianBamboo Version >= 7.2.0 < 7.2.10
AtlassianBamboo Version >= 8.0.0 < 8.0.9
AtlassianBamboo Version >= 8.1.0 < 8.1.8
AtlassianBamboo Version >= 8.2.0 < 8.2.4
AtlassianBitbucket Version < 7.6.16
AtlassianBitbucket Version >= 7.7.0 < 7.17.8
AtlassianBitbucket Version >= 7.18.0 < 7.19.5
AtlassianBitbucket Version >= 7.20.0 < 7.20.2
AtlassianBitbucket Version >= 7.21.0 < 7.21.2
AtlassianBitbucket Version8.0.0
AtlassianBitbucket Version8.1.0
AtlassianConfluence Data Center Version < 7.4.17
AtlassianConfluence Data Center Version >= 7.5.0 < 7.13.7
AtlassianConfluence Data Center Version >= 7.14.0 < 7.14.3
AtlassianConfluence Data Center Version >= 7.15.0 < 7.15.2
AtlassianConfluence Data Center Version >= 7.16.0 < 7.16.4
AtlassianConfluence Data Center Version >= 7.17.0 < 7.17.4
AtlassianConfluence Data Center Version7.18.0
AtlassianConfluence Server Version < 7.4.17
AtlassianConfluence Server Version >= 7.5.0 < 7.13.7
AtlassianConfluence Server Version >= 7.14.0 < 7.14.3
AtlassianConfluence Server Version >= 7.15.0 < 7.15.2
AtlassianConfluence Server Version >= 7.16.0 < 7.16.4
AtlassianConfluence Server Version >= 7.17.0 < 7.17.4
AtlassianConfluence Server Version7.18.0
AtlassianCrowd Version < 4.3.8
AtlassianCrowd Version >= 4.4.0 < 4.4.2
AtlassianCrowd Version5.0.0
AtlassianCrucible Version < 4.8.10
AtlassianFisheye Version < 4.8.10
AtlassianJira Data Center Version >= 8.13.0 < 8.13.22
AtlassianJira Data Center Version >= 8.14.0 < 8.20.10
AtlassianJira Data Center Version >= 8.21.0 < 8.22.4
AtlassianJira Server Version >= 8.13.0 < 8.13.22
AtlassianJira Server Version >= 8.14.0 < 8.20.10
AtlassianJira Server Version >= 8.21.0 < 8.22.4
AtlassianJira Service Desk SwEditiondata_center Version < 4.13.22
AtlassianJira Service Desk SwEditionserver Version < 4.13.22
AtlassianJira Service Management SwEditiondata_center Version >= 4.14.0 < 4.20.10
AtlassianJira Service Management SwEditionserver Version >= 4.14.0 < 4.20.10
AtlassianJira Service Management SwEditiondata_center Version >= 4.21.0 < 4.22.4
AtlassianJira Service Management SwEditionserver Version >= 4.21.0 < 4.22.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.28% 0.511
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-180 Incorrect Behavior Order: Validate Before Canonicalize

The product validates input before it is canonicalized, which prevents the product from detecting data that becomes invalid after the canonicalization step.

CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

https://jira.atlassian.com/browse/BAM-21795
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/BSERV-13370
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/CONFSERVER-79476
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/CRUC-8541
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/CWD-5815
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/FE-7410
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/JRASERVER-73897
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/JSDSERVER-11863
Patch
Vendor Advisory
Issue Tracking