CVE-2018-5228

The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:08

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/104006 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104006 - Third Party Advisory, VDB Entry
References () https://jira.atlassian.com/browse/CRUC-8201 - Vendor Advisory () https://jira.atlassian.com/browse/CRUC-8201 - Vendor Advisory
References () https://jira.atlassian.com/browse/FE-7035 - Vendor Advisory () https://jira.atlassian.com/browse/FE-7035 - Vendor Advisory

Information

Published : 2018-04-24 12:29

Updated : 2024-11-21 04:08


NVD link : CVE-2018-5228

Mitre link : CVE-2018-5228

CVE.ORG link : CVE-2018-5228


JSON object : View

Products Affected

atlassian

  • fisheye
  • crucible
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')