Vulnerabilites related to tm_software - tempo6.3.2
cve-2012-2927
Vulnerability from cvelistv5
Published
2012-05-22 15:00
Modified
2024-08-06 19:50
Severity ?
EPSS score ?
Summary
The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/49166 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/81993 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/53595 | vdb-entry, x_refsource_BID | |
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49166" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81993" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "49166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49166" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81993" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49166", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49166" }, { "name": "81993", "refsource": "OSVDB", "url": "http://osvdb.org/81993" }, { "name": "53595", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53595" }, { "name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2927", "datePublished": "2012-05-22T15:00:00", "dateReserved": "2012-05-22T00:00:00", "dateUpdated": "2024-08-06T19:50:05.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-05-22 15:55
Modified
2024-11-21 01:39
Severity ?
Summary
The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tm_software:tempo:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AB50394-E845-4289-AA14-C00297082069", "versionEndIncluding": "6.4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A4ECAC4-445B-4774-97E2-0E80DD26931A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "5DF54428-E8AB-4E0C-AC01-84006DB7DEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4CB5C44B-2007-4867-B382-778ECD60B07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "406F1724-FB6A-4567-AACF-EF00F11247EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5416C9A-0322-4E27-8E0D-ACB35A1CCC44", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE6882C3-6196-4627-ADEF-1415F5E39F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "3496377F-EE1E-4EC6-A20E-8127E623E8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "022D3DF0-1BA4-4B11-9F38-E82535852A8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7150D122-12F1-4700-B787-8E1D95F860CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D5BC919-3A24-4B3D-A0AF-3B5522E2F399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "30C58535-2AD1-4199-92CC-27E6659C0E4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "485A3879-8DD1-4D0B-A927-F8D0B6AF4BE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8730BAB-C29D-4FAA-BCAB-7483EBB3DD8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "23B02AE6-D121-4CF4-AA27-7804568B3BDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA4D919B-B553-465D-981F-70582CF19085", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "D0AD7F90-F678-4247-8E42-88487610DD63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "52C223C4-AD27-4D7C-9A49-4561DF0C6177", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B700907-A927-4E3C-88A7-18B832F3D206", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D0EF883-4B41-468A-80DC-C82D350F1B76", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7C78708-BC96-4ABA-A8FD-E128E84E5EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A696CC2B-9576-40C5-93E1-B6B9C680A7EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E154941-85BC-45E6-AB89-D9B7C7DD4698", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "21A839A4-8064-49FA-A78D-5094F957A0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3546E40E-E222-4D0E-A6B4-CC1E868F2E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E666ADD5-AFE3-42D0-ADB1-D13611AAF7FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8D42E30-DC65-4CCC-81E5-021265CC980A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DBAED-975D-4582-B7B9-8638B61785DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D66B4734-890D-4F3D-888C-F760C228265B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3DF51F9F-5FAF-4A51-93A4-B8AE4EFA6678", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "60ADCA86-451A-4755-9EA4-BA56FA40BFFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F51E4187-C8A8-4901-874B-F5FBC22C6C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "77826380-60EB-4BD3-9F2D-5B6225357C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1EA4541-9C99-4C33-BF1B-869396839AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F4A3D989-553E-4A83-9385-29726AB5329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8AE70D8E-4346-47E4-AFE2-4D8E11E03D6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A833804A-C11E-40AE-8288-35B10EE44B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "070991DB-443C-4EE8-B073-CE8241B2F909", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.1.1:jira42:*:*:*:*:*:*", "matchCriteriaId": "00000281-FDC3-4061-994A-2198988B3A7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B6AC158-49C0-4B03-AF6D-04D1500CB2E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.1-jira42:*:*:*:*:*:*:*", "matchCriteriaId": "E7E7EA8D-7575-4B60-BE52-96E5FDF25AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.2:jira42:*:*:*:*:*:*", "matchCriteriaId": "2F19625C-C38E-4256-A67A-F0D29B96C066", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.3:jira42:*:*:*:*:*:*", "matchCriteriaId": "34E764E0-194C-472B-8437-0BCDEB135411", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.4:jira42:*:*:*:*:*:*", "matchCriteriaId": "981A4F7B-7947-4CDC-A771-BD054CE4F118", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.5:jira42:*:*:*:*:*:*", "matchCriteriaId": "5523392F-E133-45FF-B2EA-92FED4504C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.6:jira42:*:*:*:*:*:*", "matchCriteriaId": "72F72EBF-5DE6-4BCA-91C8-872D16E38FAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.2.7:jira42:*:*:*:*:*:*", "matchCriteriaId": "A35A73DC-F17F-48CA-B454-724A1EADC6B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.3.1:jira42:*:*:*:*:*:*", "matchCriteriaId": "F6FB5054-BECD-4341-BA05-6805F5B4224B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.4:jira42:*:*:*:*:*:*", "matchCriteriaId": "BA3E6A01-4BB5-4891-AB31-102C45884756", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "42DA35D2-A969-4202-8449-020630E8CC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A2C42F73-FFA0-4116-B2CA-D0A8554A6315", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B5AD19BB-2640-4919-8EB9-06612E45D527", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:7.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F2708B03-8B48-4315-9372-04A1E5EBB15E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:7.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "81CA7C8D-4009-4455-9235-268E4C76632C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "51037974-8FD5-4B4E-A92F-8E4EEA58B093", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo6.3.0:jira42:*:*:*:*:*:*:*", "matchCriteriaId": "779DD283-2C65-48B4-AD41-3B68BB4B0240", "vulnerable": true }, { "criteria": "cpe:2.3:a:tm_software:tempo6.3.2:jira42:*:*:*:*:*:*:*", "matchCriteriaId": "3C802033-FC5A-470D-BB35-E96144B11707", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:jira:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8CAC456-22A9-4D0B-9642-96123EE9206A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors." }, { "lang": "es", "value": "El complemento \"Software TM Tempo\" para Atlassian JIRA antes de v6.4.3.1 , v6.5.x antes de v6.5.0.2 y v7.x antes de v7.0.3 no tiene restringe correctamente las capacidades de los analizadores XML de terceros, lo que permite provocar una denegaci\u00f3n de servicio (por excesivo consumo de recursos) a usuarios remotos autenticados a trav\u00e9s de vectores no especificados.\r\n" } ], "id": "CVE-2012-2927", "lastModified": "2024-11-21T01:39:57.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-22T15:55:02.900", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/81993" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49166" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/53595" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/81993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }