The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via "cookie tossing" a CSRF cookie from a subdomain of a Jira instance.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-69791 | Issue Tracking Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835 | Exploit Third Party Advisory |
https://jira.atlassian.com/browse/JRASERVER-69791 | Issue Tracking Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/JRASERVER-69791 - Issue Tracking, Vendor Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835 - Exploit, Third Party Advisory |
Information
Published : 2019-09-11 14:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14998
Mitre link : CVE-2019-14998
CVE.ORG link : CVE-2019-14998
JSON object : View
Products Affected
atlassian
- jira_server
CWE
CWE-352
Cross-Site Request Forgery (CSRF)