Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.
References
Link | Resource |
---|---|
https://ecosystem.atlassian.net/browse/APL-1373 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/CONFSERVER-58208 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/CRUC-8379 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/CWD-5362 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/FE-7161 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-68855 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
27 Jul 2022, 14:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Atlassian jira Data Center
Atlassian confluence Data Center Atlassian crowd |
|
CPE | cpe:2.3:a:atlassian:confluence_server:6.13.2:*:*:*:*:*:*:* cpe:2.3:a:atlassian:data_center:6.13.2:*:*:*:*:*:*:* cpe:2.3:a:atlassian:fisheye:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:atlassian:crucible:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira_server:7.13.1:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira_server:8.0.0:*:*:*:*:*:*:* |
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:* |
References | (MISC) https://jira.atlassian.com/browse/CWD-5362 - Issue Tracking, Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/FE-7161 - Issue Tracking, Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/CONFSERVER-58208 - Issue Tracking, Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/CRUC-8379 - Issue Tracking, Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/JRASERVER-68855 - Issue Tracking, Vendor Advisory |
22 Apr 2022, 20:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Atlassian data Center
Atlassian crucible Atlassian fisheye Atlassian confluence Server |
|
CPE | cpe:2.3:a:atlassian:crucible:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:atlassian:confluence_server:6.13.2:*:*:*:*:*:*:* cpe:2.3:a:atlassian:fisheye:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:atlassian:data_center:6.13.2:*:*:*:*:*:*:* |
|
References | (MISC) https://jira.atlassian.com/browse/CONFSERVER-58208 - Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/CWD-5362 - Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/FE-7161 - Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/JRASERVER-68855 - Vendor Advisory | |
References | (MISC) https://jira.atlassian.com/browse/CRUC-8379 - Vendor Advisory |
25 Mar 2022, 17:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:atlassian:jira:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira:7.13.0:*:*:*:*:*:*:* |
cpe:2.3:a:atlassian:jira_server:7.13.1:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira_server:7.13.0:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira_server:8.0.0:*:*:*:*:*:*:* |
First Time |
Atlassian jira Server
|
Information
Published : 2019-04-30 16:29
Updated : 2023-12-10 12:59
NVD link : CVE-2018-20239
Mitre link : CVE-2018-20239
CVE.ORG link : CVE-2018-20239
JSON object : View
Products Affected
atlassian
- jira_server
- confluence_server
- confluence_data_center
- crowd
- jira_data_center
- fisheye
- application_links
- crucible
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')