Description
Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-28337 | Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1. |
References
| Link | Providers |
|---|---|
| https://jira.atlassian.com/browse/JRASERVER-72940 |
|
History
Wed, 09 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-10-09T19:23:22.782Z
Reserved: 2021-09-16T00:00:00.000Z
Link: CVE-2021-41308
Updated: 2024-08-04T03:08:31.936Z
Status : Modified
Published: 2021-10-26T05:15:07.477
Modified: 2024-11-21T06:26:01.140
Link: CVE-2021-41308
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD