Total
131 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-20404 | 1 Atlassian | 2 Jira Data Center, Jira Server | 2023-12-10 | 4.0 MEDIUM | 4.3 MEDIUM |
The API in Atlassian Jira Server and Data Center before version 8.6.0 allows authenticated remote attackers to determine project titles they do not have access to via an improper authorization vulnerability. | |||||
CVE-2019-15013 | 1 Atlassian | 2 Jira, Jira Server | 2023-12-10 | 4.0 MEDIUM | 4.3 MEDIUM |
The WorkflowResource class removeStatus method in Jira before version 7.13.12, from version 8.0.0 before version 8.4.3, and from version 8.5.0 before version 8.5.2 allows authenticated remote attackers who do not have project administration access to remove a configured issue status from a project via a missing authorisation check. | |||||
CVE-2019-20098 | 1 Atlassian | 2 Jira Data Center, Jira Server | 2023-12-10 | 4.3 MEDIUM | 4.3 MEDIUM |
The VerifySmtpServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present. | |||||
CVE-2019-20405 | 1 Atlassian | 2 Jira Data Center, Jira Server | 2023-12-10 | 4.3 MEDIUM | 4.3 MEDIUM |
The JMX monitoring flag in Atlassian Jira Server and Data Center before version 8.6.0 allows remote attackers to turn the JMX monitoring flag off or on via a Cross-site request forgery (CSRF) vulnerability. | |||||
CVE-2019-20099 | 1 Atlassian | 2 Jira Data Center, Jira Server | 2023-12-10 | 4.3 MEDIUM | 4.3 MEDIUM |
The VerifyPopServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present. | |||||
CVE-2019-20401 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 4.3 MEDIUM | 6.5 MEDIUM |
Various installation setup resources in Jira before version 8.5.2 allow remote attackers to configure a Jira instance, which has not yet finished being installed, via Cross-site request forgery (CSRF) vulnerabilities. | |||||
CVE-2019-20100 | 1 Atlassian | 3 Jira, Jira Data Center, Jira Server | 2023-12-10 | 4.3 MEDIUM | 4.7 MEDIUM |
The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present. | |||||
CVE-2019-20106 | 1 Atlassian | 4 Jira, Jira Data Center, Jira Server and 1 more | 2023-12-10 | 4.0 MEDIUM | 4.3 MEDIUM |
Comment properties in Atlassian Jira Server and Data Center before version 7.13.12, from 8.0.0 before version 8.5.4, and 8.6.0 before version 8.6.1 allows remote attackers to make comments on a ticket to which they do not have commenting permissions via a broken access control bug. | |||||
CVE-2019-11589 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 5.8 MEDIUM | 6.1 MEDIUM |
The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user's Cross-site request forgery (CSRF) token, via a open redirect vulnerability. | |||||
CVE-2019-14998 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 4.3 MEDIUM | 6.5 MEDIUM |
The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via "cookie tossing" a CSRF cookie from a subdomain of a Jira instance. | |||||
CVE-2019-3399 | 1 Atlassian | 2 Jira, Jira Server | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
The BrowseProjects.jspa resource in Jira before version 7.13.2, and from version 8.0.0 before version 8.0.2 allows remote attackers to see information for archived projects through a missing authorisation check. | |||||
CVE-2019-8445 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 5.0 MEDIUM | 5.3 MEDIUM |
Several worklog rest resources in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.2 allow remote attackers to view worklog time information via a missing permissions check. | |||||
CVE-2019-3403 | 1 Atlassian | 2 Jira, Jira Server | 2023-12-10 | 5.0 MEDIUM | 5.3 MEDIUM |
The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check. | |||||
CVE-2019-8447 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 4.3 MEDIUM | 4.3 MEDIUM |
The ServiceExecutor resource in Jira before version 8.3.2 allows remote attackers to trigger the creation of export files via a Cross-site request forgery (CSRF) vulnerability. | |||||
CVE-2019-3402 | 1 Atlassian | 2 Jira, Jira Server | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter. | |||||
CVE-2019-14995 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 5.0 MEDIUM | 5.3 MEDIUM |
The /rest/api/1.0/render resource in Jira before version 8.4.0 allows remote anonymous attackers to determine if an attachment with a specific name exists and if an issue key is valid via a missing permissions check. | |||||
CVE-2019-8448 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 5.0 MEDIUM | 5.3 MEDIUM |
The login.jsp resource in Jira before version 7.13.4, and from version 8.0.0 before version 8.2.2 allows remote attackers to enumerate usernames via an information disclosure vulnerability. | |||||
CVE-2019-14996 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
The FilterPickerPopup.jspa resource in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter. | |||||
CVE-2019-8450 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 3.5 LOW | 4.8 MEDIUM |
Various templates of the Optimization plugin in Jira before version 7.13.6, and from version 8.0.0 before version 8.4.0 allow remote attackers who have permission to manage custom fields to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a custom field. | |||||
CVE-2019-14997 | 1 Atlassian | 1 Jira Server | 2023-12-10 | 4.3 MEDIUM | 4.3 MEDIUM |
The AccessLogFilter class in Jira before version 8.4.0 allows remote anonymous attackers to learn details about other users, including their username, via an information expose through caching vulnerability when Jira is configured with a reverse Proxy and or a load balancer with caching or a CDN. |