CVE-2021-41305

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. The affected versions are before version 8.13.12..
References
Link Resource
https://jira.atlassian.com/browse/JRASERVER-72813 Issue Tracking Patch Vendor Advisory
https://jira.atlassian.com/browse/JRASERVER-72813 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://jira.atlassian.com/browse/JRASERVER-72813 - Issue Tracking, Patch, Vendor Advisory () https://jira.atlassian.com/browse/JRASERVER-72813 - Issue Tracking, Patch, Vendor Advisory

Information

Published : 2021-10-26 05:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41305

Mitre link : CVE-2021-41305

CVE.ORG link : CVE-2021-41305


JSON object : View

Products Affected

atlassian

  • jira_software_data_center
  • jira
CWE
CWE-639

Authorization Bypass Through User-Controlled Key