Lucene search

K
atlassianSecurity-metrics-botJRASERVER-72014
HistoryJan 21, 2021 - 5:58 p.m.

Pre-Authorization Limited Arbitrary File Read in Jira Server - CVE-2020-29453

2021-01-2117:58:02
security-metrics-bot
jira.atlassian.com
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.014 Low

EPSS

Percentile

86.5%

The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
h3. Affected versions:

  • version < 8.5.11
  • 8.6.0 ≤ version < 8.13.3
  • 8.14.0 ≤ version < 8.15.0

h4. Fixed versions:

  • 8.5.11
  • 8.13.3
  • 8.15.0

This vulnerability is attributed to Amit Laish, a security researcher from GE Digital.

Affected configurations

Vulners
Node
atlassianjira_data_centerRange8.5.0
OR
atlassianjira_data_centerRange<8.5.11
OR
atlassianjira_data_centerRange<8.13.3
OR
atlassianjira_data_centerRange<8.15.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.014 Low

EPSS

Percentile

86.5%