cvelist/2020/14xxx/CVE-2020-14172.json

63 lines
1.8 KiB
JSON
Raw Normal View History

2020-06-16 13:01:22 +00:00
{
2020-07-13 12:13:09 +10:00
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2020-04-22T00:00:00",
"ID": "CVE-2020-14172",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
2020-07-03 02:01:27 +00:00
{
2020-07-13 12:13:09 +10:00
"product": {
"product_data": [
{
"product_name": "Jira Server",
"version": {
"version_data": [
{
"version_value": "8.8.1",
"version_affected": "<"
}
]
}
}
]
},
"vendor_name": "Atlassian"
2020-07-03 02:01:27 +00:00
}
2020-07-13 12:13:09 +10:00
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This issue exists to document that a security improvement in the way that Jira Server and Data Center use velocity templates has been implemented. The way in which velocity templates were used in Atlassian Jira Server and Data Center prior to version 8.8.1 allowed remote attackers to achieve remote code execution via insecure deserialization, if they were able to exploit a server side template injection vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Template Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/JRASERVER-70940"
}
]
}
}