// For flags

CVE-2018-20239

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.

Application Links anterior a la versión 5.0.11, desde la versión 5.1.0 a la 5.2.10, desde la versión 5.3.0 a la 5.3.6, desde la versión 5.4.0 a la 5.4.12, y desde la versión 6.0.0 a la 6.0.4, permite a atacantes remotos inyectar HTML o JavaScript arbitrario por medio de una vulnerabilidad de tipo cross site scripting (XSS) en el parámetro applinkStartingUrl. El producto es usado como un complemento en varios productos de Atlassian donde se ven impactados los siguientes: Confluence anterior a la versión 6.15.2, Crucible before anterior a la versión 4.7.0, Crowd anterior a la versión 3.4.3, Fisheye anterior a la versión 4.7.0, Jira anterior a la versión 7.13.3 y versión 8.x anterior a 8.1.0.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-19 CVE Reserved
  • 2019-04-30 CVE Published
  • 2024-04-22 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Atlassian
Search vendor "Atlassian"
Application Links
Search vendor "Atlassian" for product "Application Links"
< 5.0.11
Search vendor "Atlassian" for product "Application Links" and version " < 5.0.11"
-
Affected
Atlassian
Search vendor "Atlassian"
Application Links
Search vendor "Atlassian" for product "Application Links"
>= 5.1.0 < 5.2.10
Search vendor "Atlassian" for product "Application Links" and version " >= 5.1.0 < 5.2.10"
-
Affected
Atlassian
Search vendor "Atlassian"
Application Links
Search vendor "Atlassian" for product "Application Links"
>= 5.3.0 < 5.3.6
Search vendor "Atlassian" for product "Application Links" and version " >= 5.3.0 < 5.3.6"
-
Affected
Atlassian
Search vendor "Atlassian"
Application Links
Search vendor "Atlassian" for product "Application Links"
>= 5.4.0 < 5.4.12
Search vendor "Atlassian" for product "Application Links" and version " >= 5.4.0 < 5.4.12"
-
Affected
Atlassian
Search vendor "Atlassian"
Application Links
Search vendor "Atlassian" for product "Application Links"
>= 6.0.0 < 6.0.4
Search vendor "Atlassian" for product "Application Links" and version " >= 6.0.0 < 6.0.4"
-
Affected
Atlassian
Search vendor "Atlassian"
Confluence Data Center
Search vendor "Atlassian" for product "Confluence Data Center"
< 6.15.2
Search vendor "Atlassian" for product "Confluence Data Center" and version " < 6.15.2"
-
Affected
Atlassian
Search vendor "Atlassian"
Confluence Server
Search vendor "Atlassian" for product "Confluence Server"
< 6.15.2
Search vendor "Atlassian" for product "Confluence Server" and version " < 6.15.2"
-
Affected
Atlassian
Search vendor "Atlassian"
Crowd
Search vendor "Atlassian" for product "Crowd"
< 3.4.3
Search vendor "Atlassian" for product "Crowd" and version " < 3.4.3"
-
Affected
Atlassian
Search vendor "Atlassian"
Crucible
Search vendor "Atlassian" for product "Crucible"
< 4.7.0
Search vendor "Atlassian" for product "Crucible" and version " < 4.7.0"
-
Affected
Atlassian
Search vendor "Atlassian"
Fisheye
Search vendor "Atlassian" for product "Fisheye"
< 4.7.0
Search vendor "Atlassian" for product "Fisheye" and version " < 4.7.0"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Data Center
Search vendor "Atlassian" for product "Jira Data Center"
< 7.13.3
Search vendor "Atlassian" for product "Jira Data Center" and version " < 7.13.3"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Data Center
Search vendor "Atlassian" for product "Jira Data Center"
>= 8.0.0 < 8.1.0
Search vendor "Atlassian" for product "Jira Data Center" and version " >= 8.0.0 < 8.1.0"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Server
Search vendor "Atlassian" for product "Jira Server"
< 7.13.3
Search vendor "Atlassian" for product "Jira Server" and version " < 7.13.3"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Server
Search vendor "Atlassian" for product "Jira Server"
>= 8.0.0 < 8.1.0
Search vendor "Atlassian" for product "Jira Server" and version " >= 8.0.0 < 8.1.0"
-
Affected