Lucene search

K
cve[email protected]CVE-2021-43959
HistoryJul 26, 2022 - 8:15 a.m.

CVE-2021-43959

2022-07-2608:15:07
CWE-918
web.nvd.nist.gov
33
8
cve-2021-43959
ssrf
atlassian
jira service management
security vulnerability
server-side request forgery

5.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.4%

Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability in the CSV importing feature of JSM Insight. When running in an environment like Amazon EC2, this flaw may be used to access to a metadata resource that provides access credentials and other potentially confidential information. The affected versions are before version 4.13.20, from version 4.14.0 before 4.20.8, and from version 4.21.0 before 4.22.2.

Affected configurations

NVD
Node
atlassianjira_service_deskRange<4.13.20data_center
OR
atlassianjira_service_deskRange<4.13.20server
OR
atlassianjira_service_managementRange4.14.04.20.8data_center
OR
atlassianjira_service_managementRange4.14.04.20.8server
OR
atlassianjira_service_managementRange4.21.04.22.2data_center
OR
atlassianjira_service_managementRange4.21.04.22.2server

CNA Affected

[
  {
    "product": "Jira Service Management Server",
    "vendor": "Atlassian",
    "versions": [
      {
        "lessThan": "4.13.20",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "4.14.0",
        "versionType": "custom"
      },
      {
        "lessThan": "4.20.8",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "4.21.0",
        "versionType": "custom"
      },
      {
        "lessThan": "4.22.2",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Jira Service Management Data Center",
    "vendor": "Atlassian",
    "versions": [
      {
        "lessThan": "4.13.20",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "4.14.0",
        "versionType": "custom"
      },
      {
        "lessThan": "4.20.8",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "4.21.0",
        "versionType": "custom"
      },
      {
        "lessThan": "4.22.2",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

5.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.4%

Related for CVE-2021-43959