Page 13 of 70 results (0.006 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.7.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class. El recurso /plugins/servlet/gadgets/makeRequest en Jira versiones anteriores a 8.7.0, permite a atacantes remotos acceder al contenido de los recursos de la red interna por medio de una vulnerabilidad de tipo Server Side Request Forgery (SSRF) debido a un bug lógico en la clase JiraWhitelist • https://jira.atlassian.com/browse/JRASERVER-71204 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 0

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the project configuration feature. The affected versions are before version 8.3.0. Las versiones afectadas del servidor y centro de datos Atlassian Jira permiten a los atacantes remotos inyectar HTML o JavaScript arbitrarios a través de una vulnerabilidad de escritura en sitios cruzados (XSS) en la característica de configuración del proyecto. Las versiones afectadas son anteriores a la versión 8.3.0 • https://jira.atlassian.com/browse/JRASERVER-70856 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

Versions before 8.9.1, Various resources in Jira responded with a 404 instead of redirecting unauthenticated users to the login page, in some situations this may have allowed unauthorised attackers to determine if certain resources exist or not through an Information Disclosure vulnerability. En versiones anteriores a 8.9.1, varios recursos en Jira respondieron con un 404 en lugar de redireccionar a los usuarios no autenticados a la página de inicio de sesión, en algunas situaciones esto puede haber permitido que atacantes no autorizados determinen si existen ciertos recursos o no por medio de una vulnerabilidad de Divulgación de Información • https://jira.atlassian.com/browse/JRASERVER-71175 • CWE-203: Observable Discrepancy •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The way in which velocity templates were used in Atlassian Jira Server and Data Center prior to version 8.8.0 allowed remote attackers to gain remote code execution if they were able to exploit a server side template injection vulnerability. La manera en que las plantillas de velocidad se usaron en Atlassian Jira Server y Data Center anteriores a la versión 8.8.0, permitió a atacantes remotos obtener una ejecución de código remota, si eran capaces de explotar una vulnerabilidad de inyección de plantillas del lado del servidor • https://jira.atlassian.com/browse/JRASERVER-70944 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 4.7EPSS: 0%CPEs: 4EXPL: 1

The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present. El plugin Atlassian Application Links es vulnerable a un ataque de tipo cross-site request forgery (CSRF). • https://ecosystem.atlassian.net/browse/APL-1390 https://jira.atlassian.com/browse/JRASERVER-70607 https://www.tenable.com/security/research/tra-2020-06 • CWE-352: Cross-Site Request Forgery (CSRF) •