CVE-2019-20100
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
El plugin Atlassian Application Links es vulnerable a un ataque de tipo cross-site request forgery (CSRF). Las siguientes versiones están afectadas: todas las versiones anteriores a 5.4.21, desde versión 6.0.0 anterior a versión 6.0.12, desde versión 6.1.0 anterior a versión 6.1.2, desde versión 7.0.0 anterior a versión 7.0.2 y desde versión 7.1.0 anterior a versión 7.1.3. El plugin vulnerable es usado por Atlassian Jira Server and Data Center anterior a versión 8.7.0. Un atacante podría explotar esto al engañar a un usuario administrativo para que realice peticiones HTTP maliciosas, permitiendo que el atacante enumere hosts y abra puertos en la red interna donde el servidor Jira está presente.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-30 CVE Reserved
- 2020-02-12 CVE Published
- 2023-03-07 EPSS Updated
- 2024-09-17 CVE Updated
- 2024-09-17 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.tenable.com/security/research/tra-2020-06 | 2024-09-17 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://ecosystem.atlassian.net/browse/APL-1390 | 2022-03-30 | |
https://jira.atlassian.com/browse/JRASERVER-70607 | 2022-03-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Atlassian Search vendor "Atlassian" | Jira Search vendor "Atlassian" for product "Jira" | >= 7.0.0 < 8.4.5 Search vendor "Atlassian" for product "Jira" and version " >= 7.0.0 < 8.4.5" | - |
Affected
| ||||||
Atlassian Search vendor "Atlassian" | Jira Data Center Search vendor "Atlassian" for product "Jira Data Center" | >= 7.0.0 < 8.5.4 Search vendor "Atlassian" for product "Jira Data Center" and version " >= 7.0.0 < 8.5.4" | - |
Affected
| ||||||
Atlassian Search vendor "Atlassian" | Jira Data Center Search vendor "Atlassian" for product "Jira Data Center" | >= 8.5.5 < 8.6.2 Search vendor "Atlassian" for product "Jira Data Center" and version " >= 8.5.5 < 8.6.2" | - |
Affected
| ||||||
Atlassian Search vendor "Atlassian" | Jira Server Search vendor "Atlassian" for product "Jira Server" | >= 8.5.5 < 8.6.2 Search vendor "Atlassian" for product "Jira Server" and version " >= 8.5.5 < 8.6.2" | - |
Affected
|