Lucene search

K
atlassianSecurity-metrics-botJRASERVER-72898
HistoryOct 13, 2021 - 6:33 a.m.

Privilege escalation leads unauthorized user to edit email batch configurations - CVE-2021-41313

2021-10-1306:33:19
security-metrics-bot
jira.atlassian.com
11

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

35.5%

Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint.

The affected versions are before version 8.20.7.

Affected versions:

  • version < 8.20.7

Fixed versions:

  • 8.20.7
  • 8.21.0

Affected configurations

Vulners
Node
atlassianjira_data_centerRange8.5.0
OR
atlassianjira_data_centerRange8.13.0
OR
atlassianjira_data_centerRange<8.13.19
OR
atlassianjira_data_centerRange<8.20.7
OR
atlassianjira_data_centerRange<8.22.1

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

35.5%