cve-2019-15005
Vulnerability from cvelistv5
Published
2019-11-08 03:55
Modified
2024-09-16 20:31
Severity ?
Summary
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
Impacted products
Vendor Product Version
Atlassian Bitbucket Server Version: unspecified   < 6.6.0
Create a notification for this product.
   Atlassian Jira Server Version: unspecified   < 8.3.2
Create a notification for this product.
   Atlassian Confluence Server Version: unspecified   < 7.0.1
Create a notification for this product.
   Atlassian Crowd Version: unspecified   < 3.6.0
Create a notification for this product.
   Atlassian Fisheye Version: unspecified   < 4.7.2
Create a notification for this product.
   Atlassian Crucible Version: unspecified   < 4.7.2
Create a notification for this product.
   Atlassian Bamboo Version: unspecified   < 6.10.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:34:53.099Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/BAM-20647",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://herolab.usd.de/security-advisories/usd-2019-0016/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Bitbucket Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.6.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.3.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.0.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Crowd",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "3.6.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Fisheye",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.7.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Crucible",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.7.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Bamboo",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.10.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-11-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper Authorization",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T20:44:03",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/BAM-20647",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://herolab.usd.de/security-advisories/usd-2019-0016/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-11-08T00:00:00",
               ID: "CVE-2019-15005",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Bitbucket Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.6.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.3.2",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.0.1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crowd",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "3.6.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Fisheye",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.7.2",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crucible",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.7.2",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Bamboo",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.10.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Improper Authorization",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/BAM-20647",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/BAM-20647",
                  },
                  {
                     name: "https://herolab.usd.de/security-advisories/usd-2019-0016/",
                     refsource: "MISC",
                     url: "https://herolab.usd.de/security-advisories/usd-2019-0016/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-15005",
      datePublished: "2019-11-08T03:55:12.611106Z",
      dateReserved: "2019-08-13T00:00:00",
      dateUpdated: "2024-09-16T20:31:42.718Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:troubleshooting_and_support:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.17.2\", \"matchCriteriaId\": \"093A33BE-D93B-4CBC-9BF3-B37207CBAD84\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.10.2\", \"matchCriteriaId\": \"A17D5A1F-2408-4768-9DC3-F850B21B64AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.6.0\", \"matchCriteriaId\": \"BF79AB35-E420-4475-AD28-FC219C636C8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.0.1\", \"matchCriteriaId\": \"EC203A88-CA6B-4F1A-A68D-9C2CDE8F67FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.6.0\", \"matchCriteriaId\": \"1361951B-0754-45FF-96E4-8A886C24411B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.7.2\", \"matchCriteriaId\": \"40EB5F54-C9BD-4299-A616-E3A8E20C77FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.7.2\", \"matchCriteriaId\": \"452D57FA-0A0B-486F-9D4B-45487B68FFB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.3.2\", \"matchCriteriaId\": \"76FE371E-3000-464E-ADEE-033BF2989429\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.\"}, {\"lang\": \"es\", \"value\": \"El plugin Atlassian Troubleshooting and Support anterior a versi\\u00f3n 1.17.2, permite a un usuario sin privilegios iniciar escaneos de registros peri\\u00f3dicos y enviar los resultados a una direcci\\u00f3n de correo electr\\u00f3nico especificada por el usuario debido a una falta de comprobaci\\u00f3n de autorizaci\\u00f3n. El mensaje de correo electr\\u00f3nico puede contener informaci\\u00f3n de configuraci\\u00f3n sobre la aplicaci\\u00f3n en la que el plugin est\\u00e1 instalado. Se incluye una versi\\u00f3n vulnerable del plugin con Bitbucket Server/Data Center versiones anteriores a 6.6.0, Confluence Server / Data Center versiones anteriores a 7.0.1, Jira Server / Data Center versiones anteriores a 8.3.2, Crowd / Crowd Data Center versiones anteriores a 3.6.0, Fisheye versiones anteriores a 4.7.2, Crucible versiones anteriores a 4.7.2 y Bamboo versiones anteriores a 6.10.2.\"}]",
         id: "CVE-2019-15005",
         lastModified: "2024-11-21T04:27:51.487",
         metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
         published: "2019-11-08T04:15:10.307",
         references: "[{\"url\": \"https://herolab.usd.de/security-advisories/usd-2019-0016/\", \"source\": \"security@atlassian.com\"}, {\"url\": \"https://jira.atlassian.com/browse/BAM-20647\", \"source\": \"security@atlassian.com\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://herolab.usd.de/security-advisories/usd-2019-0016/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://jira.atlassian.com/browse/BAM-20647\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}]",
         sourceIdentifier: "security@atlassian.com",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2019-15005\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2019-11-08T04:15:10.307\",\"lastModified\":\"2024-11-21T04:27:51.487\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.\"},{\"lang\":\"es\",\"value\":\"El plugin Atlassian Troubleshooting and Support anterior a versión 1.17.2, permite a un usuario sin privilegios iniciar escaneos de registros periódicos y enviar los resultados a una dirección de correo electrónico especificada por el usuario debido a una falta de comprobación de autorización. El mensaje de correo electrónico puede contener información de configuración sobre la aplicación en la que el plugin está instalado. Se incluye una versión vulnerable del plugin con Bitbucket Server/Data Center versiones anteriores a 6.6.0, Confluence Server / Data Center versiones anteriores a 7.0.1, Jira Server / Data Center versiones anteriores a 8.3.2, Crowd / Crowd Data Center versiones anteriores a 3.6.0, Fisheye versiones anteriores a 4.7.2, Crucible versiones anteriores a 4.7.2 y Bamboo versiones anteriores a 6.10.2.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:troubleshooting_and_support:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.17.2\",\"matchCriteriaId\":\"093A33BE-D93B-4CBC-9BF3-B37207CBAD84\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.10.2\",\"matchCriteriaId\":\"A17D5A1F-2408-4768-9DC3-F850B21B64AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.6.0\",\"matchCriteriaId\":\"BF79AB35-E420-4475-AD28-FC219C636C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.0.1\",\"matchCriteriaId\":\"EC203A88-CA6B-4F1A-A68D-9C2CDE8F67FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.6.0\",\"matchCriteriaId\":\"1361951B-0754-45FF-96E4-8A886C24411B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.7.2\",\"matchCriteriaId\":\"40EB5F54-C9BD-4299-A616-E3A8E20C77FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.7.2\",\"matchCriteriaId\":\"452D57FA-0A0B-486F-9D4B-45487B68FFB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.3.2\",\"matchCriteriaId\":\"76FE371E-3000-464E-ADEE-033BF2989429\"}]}]}],\"references\":[{\"url\":\"https://herolab.usd.de/security-advisories/usd-2019-0016/\",\"source\":\"security@atlassian.com\"},{\"url\":\"https://jira.atlassian.com/browse/BAM-20647\",\"source\":\"security@atlassian.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://herolab.usd.de/security-advisories/usd-2019-0016/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://jira.atlassian.com/browse/BAM-20647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.