mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
139 lines
5.1 KiB
JSON
139 lines
5.1 KiB
JSON
{
|
|
"id": "CVE-2019-11581",
|
|
"sourceIdentifier": "security@atlassian.com",
|
|
"published": "2019-08-09T20:15:11.270",
|
|
"lastModified": "2022-03-25T17:22:37.060",
|
|
"vulnStatus": "Analyzed",
|
|
"cisaExploitAdd": "2022-03-07",
|
|
"cisaActionDue": "2022-09-07",
|
|
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
|
"cisaVulnerabilityName": "Atlassian Jira Server and Data Center Server-Side Template Injection Vulnerability",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se present\u00f3 una vulnerabilidad de inyecci\u00f3n de plantilla en el lado del servidor en Jira Server y Data Center, en las acciones ContactAdministrators y SendBulkMail. Un atacante puede ejecutar c\u00f3digo remotamente sobre sistemas que ejecutan una versi\u00f3n vulnerable de Jira Server o Data Center. Todas las versiones de Jira Server y Data Center desde 4.4.0 anteriores a 7.6.14, desde 7.7.0 anteriores a 7.13.5, desde 8.0.0 anteriores a 8.0.3, desde 8.1.0 anteriores a 8.1.2 y desde 8.2.0 anteriores a 8.2.3, est\u00e1n afectados por esta vulnerabilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-74"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "4.4",
|
|
"versionEndExcluding": "7.6.14",
|
|
"matchCriteriaId": "F79F1C8E-F7AE-41FE-816D-5CAFA5DAC805"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.7.0",
|
|
"versionEndExcluding": "7.13.5",
|
|
"matchCriteriaId": "0095C963-F6A6-4EBB-AB62-351620CD64CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.0.0",
|
|
"versionEndExcluding": "8.0.3",
|
|
"matchCriteriaId": "A0C9C08B-DEB1-483E-94C9-350EECD6A6CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.1.0",
|
|
"versionEndExcluding": "8.1.2",
|
|
"matchCriteriaId": "143F3861-2510-4E03-8CAD-957F48578976"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.2.0",
|
|
"versionEndExcluding": "8.2.3",
|
|
"matchCriteriaId": "9B7A6A37-2ABE-445D-B36A-0A0FD536CB05"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://jira.atlassian.com/browse/JRASERVER-69532",
|
|
"source": "security@atlassian.com",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |