A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
References
Link | Resource |
---|---|
https://confluence.atlassian.com/display/JIRA/Jira+Server+Security+Advisory+29nd+June+2022 | Mitigation Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-73863 | Vendor Advisory |
https://jira.atlassian.com/browse/JSDSERVER-11840 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-06-30 06:15
Updated : 2024-10-29 16:35
NVD link : CVE-2022-26135
Mitre link : CVE-2022-26135
CVE.ORG link : CVE-2022-26135
JSON object : View
Products Affected
atlassian
- jira_data_center
- jira_server
- jira_service_management
- jira_service_desk
CWE
CWE-918
Server-Side Request Forgery (SSRF)