Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_113886
HistoryMay 03, 2023 - 12:00 a.m.

Atlassian Jira Service Management 4.21.0 < 4.22.4 Multiple Vulnerabilities

2023-05-0300:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
9

According to its self-reported version number, the Atlassian Jira Service Management application running on the remote host is version 4.14.0 prior to version 4.20.10 or 4.21.0 prior to 4.22.4. It is, therefore, affected by multiple vulnerabilities:

  • A flaw which permits authenticated remote attacker to perform a full read server-side request forgery via a batch endpoint (CVE-2022-26135).

  • A vulnerability which permits a remote unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting (CVE-2022-26136).

  • A vulnerability which permits a remote unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses & also invoke the Servlet Filter to respond tto CORS requests, resulting in a CORS bypass.

Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.

No source data
VendorProductVersionCPE
atlassianjira_service_management*cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:*:*:*:*