The EditApplinkServlet resource in the Atlassian Application Links plugin before version 5.4.20, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.1, and from version 7.1.0 before version 7.1.3 allows remote attackers who have obtained access to administrator's session to access the EditApplinkServlet resource without needing to re-authenticate to pass "WebSudo" in products that support "WebSudo" through an improper access control vulnerability.
References
Link | Resource |
---|---|
https://ecosystem.atlassian.net/browse/APL-1391 | Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-70526 | Vendor Advisory |
https://ecosystem.atlassian.net/browse/APL-1391 | Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-70526 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://ecosystem.atlassian.net/browse/APL-1391 - Vendor Advisory | |
References | () https://jira.atlassian.com/browse/JRASERVER-70526 - Vendor Advisory |
Information
Published : 2020-03-17 03:15
Updated : 2024-11-21 04:38
NVD link : CVE-2019-20105
Mitre link : CVE-2019-20105
CVE.ORG link : CVE-2019-20105
JSON object : View
Products Affected
atlassian
- application_links
CWE
CWE-306
Missing Authentication for Critical Function