2024-12-08 03:06:42 +00:00

161 lines
5.3 KiB
JSON

{
"id": "CVE-2021-41308",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-10-26T05:15:07.477",
"lastModified": "2024-11-21T06:26:01.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1."
},
{
"lang": "es",
"value": "Las versiones afectadas de Atlassian Jira Server y Data Center permiten a atacantes remotos autenticados pero no administradores editar la configuraci\u00f3n de la Replicaci\u00f3n de Archivos por medio de una vulnerabilidad de Control de Acceso Rotativo en el endpoint \"ReplicationSettings!default.jspa\". Las versiones afectadas son anteriores a la versi\u00f3n 8.6.0, desde la versi\u00f3n 8.7.0 anteriores a 8.13.12, y desde la versi\u00f3n 8.14.0 antes de la 8.20.1"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security@atlassian.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.6.0",
"matchCriteriaId": "D3F0ABD5-1124-4508-8F66-18F27B041CB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.7.0",
"versionEndExcluding": "8.13.12",
"matchCriteriaId": "7429FCC4-C94E-4757-BCF1-BE73814F247D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.7.0",
"versionEndExcluding": "8.13.12",
"matchCriteriaId": "9B23960C-64BE-419D-855F-2F8EAB17327D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.14.0",
"versionEndExcluding": "8.20.1",
"matchCriteriaId": "3F1DF517-D59D-4BB7-98E5-83AC2D1A24E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.6.0",
"matchCriteriaId": "A15DCC83-66F0-4495-AF87-3EBA4A295E2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.14.0",
"versionEndExcluding": "8.20.1",
"matchCriteriaId": "CB294011-AB4E-4BC6-AB35-7E54C33B237C"
}
]
}
]
}
],
"references": [
{
"url": "https://jira.atlassian.com/browse/JRASERVER-72940",
"source": "security@atlassian.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://jira.atlassian.com/browse/JRASERVER-72940",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}