The HipChat for JIRA plugin before 6.30.0 for Atlassian JIRA allows remote authenticated users to execute arbitrary Java code via unspecified vectors, related to "Velocity Template Injection Vulnerability."
References
Configurations
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/133401/Jira-HipChat-For-Jira-Java-Code-Execution.html - | |
References | () http://www.rapid7.com/db/modules/exploit/multi/http/jira_hipchat_template - | |
References | () http://www.securityfocus.com/archive/1/536374/100/0/threaded - | |
References | () https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2015-08-26-776650785.html - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/38551/ - | |
References | () https://www.exploit-db.com/exploits/38905/ - |
Information
Published : 2015-09-21 19:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5603
Mitre link : CVE-2015-5603
CVE.ORG link : CVE-2015-5603
JSON object : View
Products Affected
atlassian
- hipchat
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')