Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.20.7.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-28342 | Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.20.7. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://jira.atlassian.com/browse/JRASERVER-72898 |
|
History
Tue, 08 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-10-08T14:22:21.571Z
Reserved: 2021-09-16T00:00:00
Link: CVE-2021-41313
Updated: 2024-08-04T03:08:31.977Z
Status : Modified
Published: 2021-11-01T03:15:06.733
Modified: 2024-11-21T06:26:02.020
Link: CVE-2021-41313
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD