CVE-2021-41306

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0.
References
Link Resource
https://jira.atlassian.com/browse/JRASERVER-72915 Issue Tracking Patch Vendor Advisory
https://jira.atlassian.com/browse/JRASERVER-72915 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://jira.atlassian.com/browse/JRASERVER-72915 - Issue Tracking, Patch, Vendor Advisory () https://jira.atlassian.com/browse/JRASERVER-72915 - Issue Tracking, Patch, Vendor Advisory

Information

Published : 2021-10-26 05:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41306

Mitre link : CVE-2021-41306

CVE.ORG link : CVE-2021-41306


JSON object : View

Products Affected

atlassian

  • jira_server
  • jira_software_data_center
  • jira
CWE
CWE-639

Authorization Bypass Through User-Controlled Key