Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view whitelist rules via a Broken Access Control vulnerability in the /rest/whitelist/<version>/check endpoint. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.
References
Link | Resource |
---|---|
https://ecosystem.atlassian.net/browse/AW-20 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-72618 | Vendor Advisory |
https://ecosystem.atlassian.net/browse/AW-20 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-72618 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://ecosystem.atlassian.net/browse/AW-20 - Issue Tracking, Vendor Advisory | |
References | () https://jira.atlassian.com/browse/JRASERVER-72618 - Vendor Advisory |
Information
Published : 2021-09-14 05:15
Updated : 2024-11-21 04:38
NVD link : CVE-2019-20101
Mitre link : CVE-2019-20101
CVE.ORG link : CVE-2019-20101
JSON object : View
Products Affected
atlassian
- data_center
- jira
CWE