// For flags

CVE-2022-36799

 

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.

Este problema se presenta para documentar que ha sido implementado una mejora de seguridad en la forma en que Jira Server y Data Center usan las plantillas. Las versiones afectadas de Atlassian Jira Server y Data Center permitían a atacantes remotos con permisos de administrador del sistema ejecutar código arbitrario por medio de una inyección de plantillas conllevando a una ejecución de código remota (RCE) en la funcionalidad Email Templates. En este caso, la mejora de seguridad consistía en proteger contra el uso de la biblioteca XStream para poder ejecutar código arbitrario en las plantillas de velocidad. Las versiones afectadas son anteriores a versión 8.13.19, desde versión 8.14.0 hasta 8.20.7, y desde versión 8.21.0 hasta 8.22.1

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-26 CVE Reserved
  • 2022-08-01 CVE Published
  • 2024-02-19 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Atlassian
Search vendor "Atlassian"
Jira Data Center
Search vendor "Atlassian" for product "Jira Data Center"
< 8.13.19
Search vendor "Atlassian" for product "Jira Data Center" and version " < 8.13.19"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Data Center
Search vendor "Atlassian" for product "Jira Data Center"
>= 8.14.0 < 8.20.7
Search vendor "Atlassian" for product "Jira Data Center" and version " >= 8.14.0 < 8.20.7"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Data Center
Search vendor "Atlassian" for product "Jira Data Center"
>= 8.21.0 < 8.22.1
Search vendor "Atlassian" for product "Jira Data Center" and version " >= 8.21.0 < 8.22.1"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Server
Search vendor "Atlassian" for product "Jira Server"
< 8.13.19
Search vendor "Atlassian" for product "Jira Server" and version " < 8.13.19"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Server
Search vendor "Atlassian" for product "Jira Server"
>= 8.14.0 < 8.20.7
Search vendor "Atlassian" for product "Jira Server" and version " >= 8.14.0 < 8.20.7"
-
Affected
Atlassian
Search vendor "Atlassian"
Jira Server
Search vendor "Atlassian" for product "Jira Server"
>= 8.21.0 < 8.22.1
Search vendor "Atlassian" for product "Jira Server" and version " >= 8.21.0 < 8.22.1"
-
Affected