All the vulnerabilites related to Atlassian - Jira Core Data Center
cve-2024-21685
Vulnerability from cvelistv5
Published
2024-06-18 17:00
Modified
2024-08-01 22:27
Severity ?
EPSS score ?
Summary
This High severity Information Disclosure vulnerability was introduced in versions 9.4.0, 9.12.0, and 9.15.0 of Jira Core Data Center.
This Information Disclosure vulnerability, with a CVSS Score of 7.4, allows an unauthenticated attacker to view sensitive information via an Information Disclosure vulnerability which has high impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction.
Atlassian recommends that Jira Core Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Jira Core Data Center 9.4: Upgrade to a release greater than or equal to 9.4.21
Jira Core Data Center 9.12: Upgrade to a release greater than or equal to 9.12.8
Jira Core Data Center 9.16: Upgrade to a release greater than or equal to 9.16.0
See the release notes. You can download the latest version of Jira Core Data Center from the download center.
This vulnerability was found internally.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Atlassian | Jira Core Data Center |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:jira_core:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_core", "vendor": "atlassian", "versions": [ { "lessThanOrEqual": "9.12.7", "status": "affected", "version": "9.12.0", "versionType": "custom" }, { "lessThanOrEqual": "9.4.20", "status": "affected", "version": "9.4.0", "versionType": "custom" }, { "lessThanOrEqual": "9.16.1", "status": "unaffected", "version": "9.16.0", "versionType": "custom" }, { "lessThanOrEqual": "9.12.10", "status": "unaffected", "version": "9.12.8", "versionType": "custom" }, { "lessThanOrEqual": "9.4.23", "status": "unaffected", "version": "9.4.21", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-21685", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-26T17:35:25.808643Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-26T17:43:55.994Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1409286211" }, { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-77713" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jira Core Data Center", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "9.12.0 to 9.12.7" }, { "status": "affected", "version": "9.4.0 to 9.4.20" }, { "status": "unaffected", "version": "9.16.0 to 9.16.1" }, { "status": "unaffected", "version": "9.12.8 to 9.12.10" }, { "status": "unaffected", "version": "9.4.21 to 9.4.23" } ] } ], "descriptions": [ { "lang": "en", "value": "This High severity Information Disclosure vulnerability was introduced in versions 9.4.0, 9.12.0, and 9.15.0 of Jira Core Data Center. \r\n\t\r\n\tThis Information Disclosure vulnerability, with a CVSS Score of 7.4, allows an unauthenticated attacker to view sensitive information via an Information Disclosure vulnerability which has high impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction. \r\n\t\r\n\tAtlassian recommends that Jira Core Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n\t\t\r\n\t\tJira Core Data Center 9.4: Upgrade to a release greater than or equal to 9.4.21\r\n\t\t\r\n\t\tJira Core Data Center 9.12: Upgrade to a release greater than or equal to 9.12.8\r\n\t\t\r\n\t\tJira Core Data Center 9.16: Upgrade to a release greater than or equal to 9.16.0\r\n\t\t\r\n\t\t\r\n\t\r\n\tSee the release notes. You can download the latest version of Jira Core Data Center from the download center. \r\n\t\r\n\tThis vulnerability was found internally." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "Information Disclosure" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T17:00:02.531Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1409286211" }, { "url": "https://jira.atlassian.com/browse/JRASERVER-77713" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2024-21685", "datePublished": "2024-06-18T17:00:00.783Z", "dateReserved": "2024-01-01T00:05:33.847Z", "dateUpdated": "2024-08-01T22:27:36.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36239
Vulnerability from cvelistv5
Published
2021-07-29 10:12
Modified
2024-10-17 15:25
Severity ?
EPSS score ?
Summary
Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-8454" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-72566" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.5.16", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "8.13.8", "status": "affected", "version": "8.6.0", "versionType": "custom" }, { "lessThan": "8.17.0", "status": "affected", "version": "8.14.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.5.16", "status": "affected", "version": "2.0.2", "versionType": "custom" }, { "lessThan": "4.13.8", "status": "affected", "version": "4.6.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.17.0", "status": "affected", "version": "4.14.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-36239", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T15:18:39.926455Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T15:25:47.384Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Jira Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "8.5.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.6.0", "versionType": "custom" }, { "lessThan": "8.13.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.17.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Core Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "8.5.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.6.0", "versionType": "custom" }, { "lessThan": "8.13.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.17.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "8.5.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.6.0", "versionType": "custom" }, { "lessThan": "8.13.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.17.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.0.2", "versionType": "custom" }, { "lessThan": "4.5.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.6.0", "versionType": "custom" }, { "lessThan": "4.13.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.17.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-29T10:12:42", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-8454" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-72566" }, { "tags": [ "x_refsource_MISC" ], "url": "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2021-07-21T17:00:00", "ID": "CVE-2020-36239", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jira Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "8.5.16" }, { "version_affected": "\u003e=", "version_value": "8.6.0" }, { "version_affected": "\u003c", "version_value": "8.13.8" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.17.0" } ] } }, { "product_name": "Jira Core Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "8.5.16" }, { "version_affected": "\u003e=", "version_value": "8.6.0" }, { "version_affected": "\u003c", "version_value": "8.13.8" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.17.0" } ] } }, { "product_name": "Jira Software Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "8.5.16" }, { "version_affected": "\u003e=", "version_value": "8.6.0" }, { "version_affected": "\u003c", "version_value": "8.13.8" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.17.0" } ] } }, { "product_name": "Jira Service Management Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.0.2" }, { "version_affected": "\u003c", "version_value": "4.5.16" }, { "version_affected": "\u003e=", "version_value": "4.6.0" }, { "version_affected": "\u003c", "version_value": "4.13.8" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.17.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862: Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/JSDSERVER-8454", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JSDSERVER-8454" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-72566", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-72566" }, { "name": "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html", "refsource": "MISC", "url": "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2020-36239", "datePublished": "2021-07-29T10:12:42.879604Z", "dateReserved": "2021-01-27T00:00:00", "dateUpdated": "2024-10-17T15:25:47.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }