Add CVE-2021-39114

This commit is contained in:
David Black 2022-04-05 13:58:23 +10:00
parent b34468b4c5
commit 5d94571039
No known key found for this signature in database
GPG Key ID: 75A6F429881B6236

View File

@ -1,18 +1,123 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2022-02-09T00:00:00",
"ID": "CVE-2021-39114",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Confluence Server",
"version": {
"version_data": [
{
"version_value": "6.13.23",
"version_affected": "<"
},
{
"version_value": "6.14.0",
"version_affected": ">="
},
{
"version_value": "7.4.11",
"version_affected": "<"
},
{
"version_value": "7.5.0",
"version_affected": ">="
},
{
"version_value": "7.11.6",
"version_affected": "<"
},
{
"version_value": "7.12.0",
"version_affected": ">="
},
{
"version_value": "7.12.5",
"version_affected": "<"
}
]
}
},
{
"product_name": "Confluence Data Center",
"version": {
"version_data": [
{
"version_value": "6.13.23",
"version_affected": "<"
},
{
"version_value": "6.14.0",
"version_affected": ">="
},
{
"version_value": "7.4.11",
"version_affected": "<"
},
{
"version_value": "7.5.0",
"version_affected": ">="
},
{
"version_value": "7.11.6",
"version_affected": "<"
},
{
"version_value": "7.12.0",
"version_affected": ">="
},
{
"version_value": "7.12.5",
"version_affected": "<"
}
]
}
}
]
},
"vendor_name": "Atlassian"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/CONFSERVER-68844",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/CONFSERVER-68844"
}
]
}
}
}