CVE-2021-39111

The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field.
References
Link Resource
https://jira.atlassian.com/browse/JRASERVER-72716 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-08-30 07:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-39111

Mitre link : CVE-2021-39111

CVE.ORG link : CVE-2021-39111


JSON object : View

Products Affected

atlassian

  • jira_server
  • jira
  • jira_data_center
  • data_center
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')