Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-72915 | Issue Tracking Patch Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-72915 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/JRASERVER-72915 - Issue Tracking, Patch, Vendor Advisory |
Information
Published : 2021-10-26 05:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41306
Mitre link : CVE-2021-41306
CVE.ORG link : CVE-2021-41306
JSON object : View
Products Affected
atlassian
- jira_server
- jira_software_data_center
- jira
CWE
CWE-639
Authorization Bypass Through User-Controlled Key