The /rest/api/1.0/render resource in Jira before version 8.4.0 allows remote anonymous attackers to determine if an attachment with a specific name exists and if an issue key is valid via a missing permissions check.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-69792 | Issue Tracking Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837 | Exploit Third Party Advisory |
https://jira.atlassian.com/browse/JRASERVER-69792 | Issue Tracking Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/JRASERVER-69792 - Issue Tracking, Vendor Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836 - Exploit, Third Party Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837 - Exploit, Third Party Advisory |
Information
Published : 2019-09-11 14:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14995
Mitre link : CVE-2019-14995
CVE.ORG link : CVE-2019-14995
JSON object : View
Products Affected
atlassian
- jira_server