{ "id": "CVE-2019-14999", "sourceIdentifier": "security@atlassian.com", "published": "2019-08-23T14:15:11.670", "lastModified": "2019-08-30T13:51:22.690", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Uninstall REST endpoint in Atlassian Universal Plugin Manager before version 2.22.19, from version 3.0.0 before version 3.0.3 and from version 4.0.0 before version 4.0.3 allows remote attackers to uninstall plugins using a Cross-Site Request Forgery (CSRF) vulnerability on an authenticated administrator." }, { "lang": "es", "value": "El punto final REST de desinstalaci\u00f3n en Atlassian Universal Plugin Manager antes de la versi\u00f3n 2.22.19, de la versi\u00f3n 3.0.0 antes de la versi\u00f3n 3.0.3 y de la versi\u00f3n 4.0.0 antes de la versi\u00f3n 4.0.3 permite a los atacantes remotos desinstalar complementos utilizando una falsificaci\u00f3n de solicitud entre sitios ( CSRF) vulnerabilidad en un administrador autenticado." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:atlassian:universal_plugin_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.22.19", "matchCriteriaId": "121AEF1B-E092-453B-AD35-5FC946021A3B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:atlassian:universal_plugin_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.0.3", "matchCriteriaId": "5B381C60-6F2D-47A3-8A80-92188DC02F78" }, { "vulnerable": true, "criteria": "cpe:2.3:a:atlassian:universal_plugin_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.0.3", "matchCriteriaId": "9B633550-159E-465F-95D4-5085B9C461E9" } ] } ] } ], "references": [ { "url": "https://ecosystem.atlassian.net/browse/UPM-6044", "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ] } ] }