Page 7 of 44 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter. El recurso review attachment en Atlassian Fisheye y Crucible en versiones anteriores a la 4.3.2, desde la 4.4.0 hasta la 4.4.3 y en versiones anteriores a la 4.5.0 permite que los atacantes remotos lean archivos contenidos en la ruta context de la aplicación en ejecución mediante una vulnerabilidad de salto de directorio en el parámetro command. • http://www.securityfocus.com/bid/104578 https://jira.atlassian.com/browse/CRUC-8212 https://jira.atlassian.com/browse/FE-7061 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers. El recurso /browse/~raw en Atlassian FishEye y Crucible, en versiones anteriores a la 4.5.3, permite que atacantes remotos inyecten HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) en la gestión de cabeceras de respuesta. • http://www.securityfocus.com/bid/104006 https://jira.atlassian.com/browse/CRUC-8201 https://jira.atlassian.com/browse/FE-7035 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 4EXPL: 0

The source browse resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 allows allows remote attackers that have write access to an indexed repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in via a specially crafted repository branch name when trying to display deleted files of the branch. El recurso de exploración de fuentes en Atlassian Fisheye y Crucible en versiones anterores 4.5.1 y 4.6.0 permite a los atacantes remotos que tienen acceso de escritura a un repositorio indexado inyectar HTML o JavaScript arbitrario a través de una vulnerabilidad de scripts de sitios cruzados (XSS) a través de un nombre de rama del repositorio especialmente elaborado cuando se intenta mostrar los archivos eliminados de la rama • https://jira.atlassian.com/browse/CRUC-8161 https://jira.atlassian.com/browse/FE-6994 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

The /rest/review-coverage-chart/1.0/data/<repository_name>/.json resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 was missing a permissions check, this allows remote attackers who do not have access to a particular repository to determine its existence and access review coverage statistics for it. El recurso /rest/review-coverage-chart/1.0/data//.json en Atlassian Fisheye y Crucible, en versiones anteriores a la 4.5.1 y la 4.6.0, no tenía una comprobación de permisos. Esto permite que atacantes remotos que no tengan acceso a un repositorio en concreto determinen su existencia y accedan a sus estadísticas de cobertura de revisión. • https://jira.atlassian.com/browse/CRUC-8163 https://jira.atlassian.com/browse/FE-6996 • CWE-284: Improper Access Control CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 0

It was possible for double OGNL evaluation in certain redirect action and in WebWork URL and Anchor tags in JSP files to occur. An attacker who can access the web interface of Fisheye or Crucible or who hosts a website that a user who can access the web interface of Fisheye or Crucible visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Fisheye or Crucible. All versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.2 (the fixed version for 4.5.x) are affected by this vulnerability. La doble evaluación OGNL era posible en algunas acciones de redirección y en la URL WebWork y las etiquetas Anchor de archivos JSP. Un atacante que pueda acceder a la interfaz web de Fisheye o Crucible o que aloje un sitio web que visite un usuario que pueda acceder a la interfaz web de Fisheye o Crucible puede explotar esta vulnerabilidad para ejecutar código Java a voluntad en sistemas que ejecuten una versión vulnerable de Fisheye o de Crucible. • http://www.securityfocus.com/bid/102971 https://confluence.atlassian.com/x/h-QyO https://confluence.atlassian.com/x/iPQyO https://jira.atlassian.com/browse/CRUC-8156 https://jira.atlassian.com/browse/FE-6991 •