CVE-2021-41311
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1.
Las versiones afectadas de Atlassian Jira Server y Data Center permiten a atacantes con acceso a una cuenta de administrador a la que le es revocado el acceso, modificar la configuración de Usuarios y Roles de los proyectos, por medio de una vulnerabilidad de Autenticación Rota en el endpoint /plugins/servlet/project-config/PROJECT/roles. Las versiones afectadas son anteriores a la versión 8.19.1
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2021-09-16 CVE Reserved
- 2021-12-08 CVE Published
- 2024-07-11 EPSS Updated
- 2024-10-10 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://jira.atlassian.com/browse/JRASERVER-72802 | 2021-12-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Atlassian Search vendor "Atlassian" | Jira Software Data Center Search vendor "Atlassian" for product "Jira Software Data Center" | < 8.19.1 Search vendor "Atlassian" for product "Jira Software Data Center" and version " < 8.19.1" | - |
Affected
|