cve-2019-11589
Vulnerability from cvelistv5
Published
2019-08-23 13:49
Modified
2024-09-17 04:05
Severity ?
EPSS score ?
Summary
The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user's Cross-site request forgery (CSRF) token, via a open redirect vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/JRASERVER-69780 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/JRASERVER-69780 | Issue Tracking, Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:41.046Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-69780" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jira", "vendor": "Atlassian", "versions": [ { "lessThan": "7.13.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.2.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.3.0", "versionType": "custom" }, { "lessThan": "8.3.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user\u0027s Cross-site request forgery (CSRF) token, via a open redirect vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-23T13:49:47", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-69780" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-08-13T00:00:00", "ID": "CVE-2019-11589", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jira", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.13.6" }, { "version_affected": "\u003e=", "version_value": "8.0.0" }, { "version_affected": "\u003c", "version_value": "8.2.3" }, { "version_affected": "\u003e=", "version_value": "8.3.0" }, { "version_affected": "\u003c", "version_value": "8.3.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user\u0027s Cross-site request forgery (CSRF) token, via a open redirect vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/JRASERVER-69780", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-69780" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-11589", "datePublished": "2019-08-23T13:49:47.709583Z", "dateReserved": "2019-04-29T00:00:00", "dateUpdated": "2024-09-17T04:05:01.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.13.0\", \"versionEndExcluding\": \"7.13.6\", \"matchCriteriaId\": \"2FED3DB9-E64F-4E15-B91A-03B408E4EA4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.0.0\", \"versionEndExcluding\": \"8.2.3\", \"matchCriteriaId\": \"F665F2DD-7C62-43CB-8FEB-2DB1521D8A87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.3.0\", \"versionEndExcluding\": \"8.3.2\", \"matchCriteriaId\": \"55DBB75B-F9FF-435E-B392-99F61ABBD6C5\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user\u0027s Cross-site request forgery (CSRF) token, via a open redirect vulnerability.\"}, {\"lang\": \"es\", \"value\": \"El recurso ChangeSharedFilterOwner en Jira antes de la versi\\u00f3n 7.13.6, de la versi\\u00f3n 8.0.0 antes de la versi\\u00f3n 8.2.3, y de la versi\\u00f3n 8.3.0 antes de la versi\\u00f3n 8.3.2 permite que los atacantes remotos ataquen a los usuarios, en algunos casos pueden obtener el Cross de un usuario token de falsificaci\\u00f3n de solicitud de sitio (CSRF), a trav\\u00e9s de una vulnerabilidad de redireccionamiento abierto.r en Jira antes de la versi\\u00f3n 7.13.6, de la versi\\u00f3n 8.0.0 antes de la versi\\u00f3n 8.2.3, y de la versi\\u00f3n 8.3.0 antes de la versi\\u00f3n 8.3.2 permite que los atacantes remotos ataquen a los usuarios, en algunos casos pueden obtener el Cross de un usuario token de falsificaci\\u00f3n de solicitud de sitio (CSRF), a trav\\u00e9s de una vulnerabilidad de redireccionamiento abierto.\"}]", "id": "CVE-2019-11589", "lastModified": "2024-11-21T04:21:23.850", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2019-08-23T14:15:11.407", "references": "[{\"url\": \"https://jira.atlassian.com/browse/JRASERVER-69780\", \"source\": \"security@atlassian.com\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://jira.atlassian.com/browse/JRASERVER-69780\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}]", "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-601\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-11589\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2019-08-23T14:15:11.407\",\"lastModified\":\"2024-11-21T04:21:23.850\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user\u0027s Cross-site request forgery (CSRF) token, via a open redirect vulnerability.\"},{\"lang\":\"es\",\"value\":\"El recurso ChangeSharedFilterOwner en Jira antes de la versi\u00f3n 7.13.6, de la versi\u00f3n 8.0.0 antes de la versi\u00f3n 8.2.3, y de la versi\u00f3n 8.3.0 antes de la versi\u00f3n 8.3.2 permite que los atacantes remotos ataquen a los usuarios, en algunos casos pueden obtener el Cross de un usuario token de falsificaci\u00f3n de solicitud de sitio (CSRF), a trav\u00e9s de una vulnerabilidad de redireccionamiento abierto.r en Jira antes de la versi\u00f3n 7.13.6, de la versi\u00f3n 8.0.0 antes de la versi\u00f3n 8.2.3, y de la versi\u00f3n 8.3.0 antes de la versi\u00f3n 8.3.2 permite que los atacantes remotos ataquen a los usuarios, en algunos casos pueden obtener el Cross de un usuario token de falsificaci\u00f3n de solicitud de sitio (CSRF), a trav\u00e9s de una vulnerabilidad de redireccionamiento abierto.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.13.0\",\"versionEndExcluding\":\"7.13.6\",\"matchCriteriaId\":\"2FED3DB9-E64F-4E15-B91A-03B408E4EA4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.2.3\",\"matchCriteriaId\":\"F665F2DD-7C62-43CB-8FEB-2DB1521D8A87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.3.0\",\"versionEndExcluding\":\"8.3.2\",\"matchCriteriaId\":\"55DBB75B-F9FF-435E-B392-99F61ABBD6C5\"}]}]}],\"references\":[{\"url\":\"https://jira.atlassian.com/browse/JRASERVER-69780\",\"source\":\"security@atlassian.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/JRASERVER-69780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.