8.8

CVE-2022-26137

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AtlassianBamboo Version >= 7.2.0 < 7.2.10
AtlassianBamboo Version >= 8.0.0 < 8.0.9
AtlassianBamboo Version >= 8.1.0 < 8.1.8
AtlassianBamboo Version >= 8.2.0 < 8.2.4
AtlassianBitbucket Version < 7.6.16
AtlassianBitbucket Version >= 7.7.0 < 7.17.8
AtlassianBitbucket Version >= 7.18.0 < 7.19.5
AtlassianBitbucket Version >= 7.20.0 < 7.20.2
AtlassianBitbucket Version >= 7.21.0 < 7.21.2
AtlassianBitbucket Version8.0.0
AtlassianBitbucket Version8.1.0
AtlassianConfluence Data Center Version < 7.4.17
AtlassianConfluence Data Center Version >= 7.5.0 < 7.13.7
AtlassianConfluence Data Center Version >= 7.14.0 < 7.14.3
AtlassianConfluence Data Center Version >= 7.15.0 < 7.15.2
AtlassianConfluence Data Center Version >= 7.16.0 < 7.16.4
AtlassianConfluence Data Center Version >= 7.17.0 < 7.17.4
AtlassianConfluence Data Center Version7.18.0
AtlassianConfluence Server Version < 7.4.17
AtlassianConfluence Server Version >= 7.5.0 < 7.13.7
AtlassianConfluence Server Version >= 7.14.0 < 7.14.3
AtlassianConfluence Server Version >= 7.15.0 < 7.15.2
AtlassianConfluence Server Version >= 7.16.0 < 7.16.4
AtlassianConfluence Server Version >= 7.17.0 < 7.17.4
AtlassianConfluence Server Version7.18.0
AtlassianCrowd Version < 4.3.8
AtlassianCrowd Version >= 4.4.0 < 4.4.2
AtlassianCrowd Version5.0.0
AtlassianCrucible Version < 4.8.10
AtlassianFisheye Version < 4.8.10
AtlassianJira Data Center Version >= 8.13.0 < 8.13.22
AtlassianJira Data Center Version >= 8.14.0 < 8.20.10
AtlassianJira Data Center Version >= 8.21.0 < 8.22.4
AtlassianJira Server Version >= 8.13.0 < 8.13.22
AtlassianJira Server Version >= 8.14.0 < 8.20.10
AtlassianJira Server Version >= 8.21.0 < 8.22.4
AtlassianJira Service Desk SwEditiondata_center Version < 4.13.22
AtlassianJira Service Desk SwEditionserver Version < 4.13.22
AtlassianJira Service Management SwEditiondata_center Version >= 4.14.0 < 4.20.10
AtlassianJira Service Management SwEditionserver Version >= 4.14.0 < 4.20.10
AtlassianJira Service Management SwEditiondata_center Version >= 4.21.0 < 4.22.4
AtlassianJira Service Management SwEditionserver Version >= 4.21.0 < 4.22.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.203
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-180 Incorrect Behavior Order: Validate Before Canonicalize

The product validates input before it is canonicalized, which prevents the product from detecting data that becomes invalid after the canonicalization step.

CWE-346 Origin Validation Error

The product does not properly verify that the source of data or communication is valid.

https://jira.atlassian.com/browse/BAM-21795
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/BSERV-13370
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/CONFSERVER-79476
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/CRUC-8541
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/CWD-5815
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/FE-7410
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/JRASERVER-73897
Patch
Vendor Advisory
Issue Tracking
https://jira.atlassian.com/browse/JSDSERVER-11863
Patch
Vendor Advisory
Issue Tracking