Lucene search

K
nvd[email protected]NVD:CVE-2022-26136
HistoryJul 20, 2022 - 6:15 p.m.

CVE-2022-26136

2022-07-2018:15:08
CWE-287
CWE-180
web.nvd.nist.gov
1

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.4%

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.

Affected configurations

NVD
Node
atlassianbambooRange7.2.0–7.2.10
OR
atlassianbambooRange8.0.0–8.0.9
OR
atlassianbambooRange8.1.0–8.1.8
OR
atlassianbambooRange8.2.0–8.2.4
OR
atlassianbitbucketRange<7.6.16
OR
atlassianbitbucketRange7.7.0–7.17.8
OR
atlassianbitbucketRange7.18.0–7.19.5
OR
atlassianbitbucketRange7.20.0–7.20.2
OR
atlassianbitbucketRange7.21.0–7.21.2
OR
atlassianbitbucketMatch8.0.0
OR
atlassianbitbucketMatch8.1.0
OR
atlassianconfluence_data_centerRange<7.4.17
OR
atlassianconfluence_data_centerRange7.5.0–7.13.7
OR
atlassianconfluence_data_centerRange7.14.0–7.14.3
OR
atlassianconfluence_data_centerRange7.15.0–7.15.2
OR
atlassianconfluence_data_centerRange7.16.0–7.16.4
OR
atlassianconfluence_data_centerRange7.17.0–7.17.4
OR
atlassianconfluence_data_centerMatch7.18.0
OR
atlassianconfluence_serverRange<7.4.17
OR
atlassianconfluence_serverRange7.5.0–7.13.7
OR
atlassianconfluence_serverRange7.14.0–7.14.3
OR
atlassianconfluence_serverRange7.15.0–7.15.2
OR
atlassianconfluence_serverRange7.16.0–7.16.4
OR
atlassianconfluence_serverRange7.17.0–7.17.4
OR
atlassianconfluence_serverMatch7.18.0
OR
atlassiancrowdRange<4.3.8
OR
atlassiancrowdRange4.4.0–4.4.2
OR
atlassiancrowdMatch5.0.0
OR
atlassiancrucibleRange<4.8.10
OR
atlassianfisheyeRange<4.8.10
OR
atlassianjira_data_centerRange8.13.0–8.13.22
OR
atlassianjira_data_centerRange8.14.0–8.20.10
OR
atlassianjira_data_centerRange8.21.0–8.22.4
OR
atlassianjira_serverRange8.13.0–8.13.22
OR
atlassianjira_serverRange8.14.0–8.20.10
OR
atlassianjira_serverRange8.21.0–8.22.4
OR
atlassianjira_service_deskRange<4.13.22data_center
OR
atlassianjira_service_deskRange<4.13.22server
OR
atlassianjira_service_managementRange4.14.0–4.20.10data_center
OR
atlassianjira_service_managementRange4.14.0–4.20.10server
OR
atlassianjira_service_managementRange4.21.0–4.22.4data_center
OR
atlassianjira_service_managementRange4.21.0–4.22.4server

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.4%