The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a vnd.wap.xhtml+xml content type.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-71113 | Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-71113 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/JRASERVER-71113 - Vendor Advisory |
Information
Published : 2020-07-01 02:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4024
Mitre link : CVE-2020-4024
CVE.ORG link : CVE-2020-4024
JSON object : View
Products Affected
atlassian
- jira_data_center
- jira_server
- jira_software_data_center
- jira
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')