8.8
CVE-2022-26137
- EPSS 0.07%
- Veröffentlicht 20.07.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:53:30
- Quelle security@atlassian.com
- CVE-Watchlists
- Unerledigt
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Atlassian ≫ Confluence Data Center Version < 7.4.17
Atlassian ≫ Confluence Data Center Version >= 7.5.0 < 7.13.7
Atlassian ≫ Confluence Data Center Version >= 7.14.0 < 7.14.3
Atlassian ≫ Confluence Data Center Version >= 7.15.0 < 7.15.2
Atlassian ≫ Confluence Data Center Version >= 7.16.0 < 7.16.4
Atlassian ≫ Confluence Data Center Version >= 7.17.0 < 7.17.4
Atlassian ≫ Confluence Data Center Version7.18.0
Atlassian ≫ Confluence Server Version < 7.4.17
Atlassian ≫ Confluence Server Version >= 7.5.0 < 7.13.7
Atlassian ≫ Confluence Server Version >= 7.14.0 < 7.14.3
Atlassian ≫ Confluence Server Version >= 7.15.0 < 7.15.2
Atlassian ≫ Confluence Server Version >= 7.16.0 < 7.16.4
Atlassian ≫ Confluence Server Version >= 7.17.0 < 7.17.4
Atlassian ≫ Confluence Server Version7.18.0
Atlassian ≫ Jira Data Center Version >= 8.13.0 < 8.13.22
Atlassian ≫ Jira Data Center Version >= 8.14.0 < 8.20.10
Atlassian ≫ Jira Data Center Version >= 8.21.0 < 8.22.4
Atlassian ≫ Jira Server Version >= 8.13.0 < 8.13.22
Atlassian ≫ Jira Server Version >= 8.14.0 < 8.20.10
Atlassian ≫ Jira Server Version >= 8.21.0 < 8.22.4
Atlassian ≫ Jira Service Desk SwEditiondata_center Version < 4.13.22
Atlassian ≫ Jira Service Desk SwEditionserver Version < 4.13.22
Atlassian ≫ Jira Service Management SwEditiondata_center Version >= 4.14.0 < 4.20.10
Atlassian ≫ Jira Service Management SwEditionserver Version >= 4.14.0 < 4.20.10
Atlassian ≫ Jira Service Management SwEditiondata_center Version >= 4.21.0 < 4.22.4
Atlassian ≫ Jira Service Management SwEditionserver Version >= 4.21.0 < 4.22.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.203 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-180 Incorrect Behavior Order: Validate Before Canonicalize
The product validates input before it is canonicalized, which prevents the product from detecting data that becomes invalid after the canonicalization step.
CWE-346 Origin Validation Error
The product does not properly verify that the source of data or communication is valid.