A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
References
Link | Resource |
---|---|
https://confluence.atlassian.com/display/JIRA/Jira+Server+Security+Advisory+29nd+June+2022 | Mitigation Vendor Advisory |
https://jira.atlassian.com/browse/JRASERVER-73863 | Vendor Advisory |
https://jira.atlassian.com/browse/JSDSERVER-11840 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: atlassian
Published: 2022-06-29T00:00:00
Updated: 2022-06-30T05:20:15
Reserved: 2022-02-25T00:00:00
Link: CVE-2022-26135
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-06-30T06:15:07.693
Modified: 2022-08-04T15:31:35.393
Link: CVE-2022-26135
JSON object: View
Redhat Information
No data.
CWE