CVE-2021-41313

Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.20.7.
References
Link Resource
https://jira.atlassian.com/browse/JRASERVER-72898 Issue Tracking Vendor Advisory
https://jira.atlassian.com/browse/JRASERVER-72898 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://jira.atlassian.com/browse/JRASERVER-72898 - Issue Tracking, Vendor Advisory () https://jira.atlassian.com/browse/JRASERVER-72898 - Issue Tracking, Vendor Advisory

Information

Published : 2021-11-01 03:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41313

Mitre link : CVE-2021-41313

CVE.ORG link : CVE-2021-41313


JSON object : View

Products Affected

atlassian

  • jira_data_center
  • jira_server
CWE
CWE-285

Improper Authorization

NVD-CWE-Other