Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.
References
Link Resource
https://ecosystem.atlassian.net/browse/APL-1373 Issue Tracking Vendor Advisory
https://jira.atlassian.com/browse/CONFSERVER-58208 Issue Tracking Vendor Advisory
https://jira.atlassian.com/browse/CRUC-8379 Issue Tracking Vendor Advisory
https://jira.atlassian.com/browse/CWD-5362 Issue Tracking Vendor Advisory
https://jira.atlassian.com/browse/FE-7161 Issue Tracking Vendor Advisory
https://jira.atlassian.com/browse/JRASERVER-68855 Issue Tracking Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: atlassian

Published: 2019-04-29T00:00:00

Updated: 2019-05-29T20:20:19

Reserved: 2018-12-19T00:00:00


Link: CVE-2018-20239

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-04-30T16:29:00.247

Modified: 2022-07-27T14:40:56.710


Link: CVE-2018-20239

JSON object: View

cve-icon Redhat Information

No data.

CWE