CVE-2012-2928
https://notcve.org/view.php?id=CVE-2012-2928
The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors. El complemento Gliffy para Atlassian JIRA v3.7.1, y en version anteriores ala v4.2 para Atlassian Confluence, no restringe correctamente las capacidades de los analizadores XML de tercer nivel, lo que permite leer ficheros de su elección o causar una denegación de servicio (por excesivo consumo de recursos) a atacantes remotos a través de vectores no especificados. • http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17 http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17 http://osvdb.org/81993 http://secunia.com/advisories/49166 http://www.securityfocus.com/bid/53595 https://exchange.xforce.ibmcloud.com/vulnerabilities/75697 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-2926 – Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service
https://notcve.org/view.php?id=CVE-2012-2926
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors. Atlassian JIRA antes de v5.0.1; Confluence antes de v3.5.16, v4.0 antes de v4.0.7, y v4.1 antes del v4.1.10; 'FishEye and Crucible' antes de v2.5.8, v2.6 antes de v2.6.8, y v2.7 antes de v2.7.12; Bamboo antes de v3.3.4 y v3.4.x antes de v3.4.5, y Crowd antes de v2.0.9, v2.1 antes de v2.1.2, v2.2 antes de v2.2.9, v2.3 antes de v2.3.7 y v2.4 antes de v2.4.1 no restringen correctamente las capacidades de los analizadores XML de de terceros, lo que permite leer ficheros de su elección o causar una denegación de servicio (por excesivo consumo de recursos) a atacantes remotos a través de vectores no especificados. • https://www.exploit-db.com/exploits/37218 http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17 http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17 http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17 http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17 http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17 http://osvdb.org/81993 http://secunia •
CVE-2008-6531
https://notcve.org/view.php?id=CVE-2008-6531
The WebWork 1 web application framework in Atlassian JIRA before 3.13.2 allows remote attackers to invoke exposed public JIRA methods via a crafted URL that is dynamically transformed into method calls, aka "WebWork 1 Parameter Injection Hole." La la aplicación ebWork 1 web framework en Atlassian JIRA v3.13.2, permite a atacantes remotos invocar los métodos públicos de JIRA a través de una URL manipulada en la llamada al método. También conocido como "WebWork 1 Parameter Injection Hole." • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2008-12-09 http://secunia.com/advisories/33084 http://www.osvdb.org/52707 http://www.securityfocus.com/bid/32746 https://exchange.xforce.ibmcloud.com/vulnerabilities/47211 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-6617
https://notcve.org/view.php?id=CVE-2007-6617
Cross-site scripting (XSS) vulnerability in 500page.jsp in JIRA Enterprise Edition before 3.12.1 allows remote attackers to inject arbitrary web script or HTML, which is not properly handled when generating error messages, as demonstrated by input originally sent in the URI to secure/CreateIssue. NOTE: some of these details are obtained from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en 500page.jsp de JIRA Enterprise Edition versiones anteriores a 3.12.1 permite a atacantes remotos inyectar scripts web o HTML de su elección, que no son apropiadamente gestionado cuando se generan mensajes de error, como se demuestra con entradas originalmente enviadas en el URI a secure/CreateIssue. NOTA: algunos de estos detalles se han obtenido de información de terceros. • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24 http://jira.atlassian.com/browse/CONF-9560 http://osvdb.org/42768 http://secunia.com/advisories/27954 http://www.securityfocus.com/bid/27094 http://www.securityfocus.com/bid/27095 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-6618
https://notcve.org/view.php?id=CVE-2007-6618
JIRA Enterprise Edition before 3.12.1 allows remote attackers to delete another user's shared filter via a modified filter ID. JIRA Enterprise Edition anterior a 3.12.1 permite a atacantes remotos borrar filtros compartidos de otros usuarios mediante un identificador de filtro modificado. • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24 http://osvdb.org/42769 http://secunia.com/advisories/27954 http://www.securityfocus.com/bid/27095 •