CVE-2008-6831
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA Enterprise Edition 3.13 allow remote attackers to inject arbitrary web script or HTML via the (1) fullname (Full Name) parameter in the ViewProfile page or (2) returnUrl parameter in a form, as demonstrated using secure/AddComment!default.jspa (aka "Add Comment").
Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en JIRA Enterprise Edition v3.13 de Atlassian permiten a usuarios remotos inyectar codigo web script o código HTML a través de (1) el parámetro "fullname" (nombre completo) en la página "ViewProfile" (ver perfil) o (2) el parámetro returnUrl en un formulario, como se ha demostrado usando secure/AddComment!default.jspa (añadir comentario).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-06-08 CVE Reserved
- 2009-06-08 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://osvdb.org/49415 | Vdb Entry | |
http://osvdb.org/49416 | Vdb Entry | |
http://www.securityfocus.com/bid/31967 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46167 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46168 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2008-10-29 | 2017-08-17 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/32113 | 2017-08-17 |