FKIE_CVE-2016-6668
Vulnerability from fkie_nvd - Published: 2017-01-23 21:59 - Updated: 2025-04-20 01:37
Severity ?
Summary
The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "351C6311-8084-42F3-B7A4-A8E53D73FF33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAAC3596-B70A-49A8-9062-1501474A5365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "93D84D4C-7376-4590-8BD7-933F94590C29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FA204C29-5582-46B3-8EA5-EA890598F5A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "499688C7-21F0-49E0-9E8F-CDD6D7C768A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4014117A-31F3-4494-9239-6DDFB89DB805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA9632D-C9F1-448B-8FFD-90FEF0C1C228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0883B0DB-DF33-4B80-A870-690D8A794824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89276664-D60B-40C5-8837-8C4421EACEAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC2ACC2-E9DA-4C01-9FFD-E23FC7AAC970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "70460C0E-1BB6-491A-9897-6F1EB5C10BAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C0E9A8-6031-4F92-A709-F98C23FF6307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6594A7E7-169D-493A-966D-44E6229F9A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755F76DA-E7D5-43A0-B441-E734B6A5AE96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE134D2F-B6D7-4DD7-8D69-B44FD79A7E9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FD51134D-388F-4698-8993-6D927659DF45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:5.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0F69A3AE-7B13-4223-8CFD-7C64D5729177",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED7EB5D9-41D2-4F5A-BB71-8965231E0E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF46F73-B274-4CAC-B09C-22B3922F8AE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCA2BF59-2057-4D40-9D2D-167DCD65BB36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22D74C92-6404-4423-A63E-D8FB73B93FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.31.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7E859E-FAB5-4814-92C0-EEAD91ED6C76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A142C047-72E7-4A3B-A6D7-798111597569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F08AE659-167E-478A-A8D4-376E6189C31F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "798FABED-5F49-44C3-AB06-8AA9C5129F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D0E6E69-4C4C-4AB7-B5EC-98AC16538DB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "243FA02E-0878-4D6F-B421-19B25475A3FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55AD904B-172D-4743-9424-620C0F8F4D11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B740B376-B549-4455-AFD9-0FB377707AB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA633A3-6190-4CF9-B501-427151C90C1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages."
},
{
"lang": "es",
"value": "El Atlassian Hipchat Integration Plugin para Bitbucket Server 6.26.0 en versiones anteriores a 6.27.5, 6.28.0 en versiones anteriores a 7.3.7 y 7.4.0 en versiones anteriores a 7.8.17; pllugin HipChat para Confluence 6.26.0 en versiones anteriores a 7.8.17; y plugin HipChat para JIRA 6.26.0 en versiones anteriores a 7.8.17 permite a atacantes remotos obtener la clave secreta para comunicarse con instancias HipChat leyendo p\u00e1ginas no especificadas."
}
],
"id": "CVE-2016-6668",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-01-23T21:59:02.360",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/539530/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/93159"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/539530/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/93159"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…