cnvd-2020-50483
Vulnerability from cnvd
Title
Atlassian JIRA Server和Data Center Add Field模块跨站脚本漏洞
Description
Atlassian JIRA Server和Atlassian JIRA Data Center都是澳大利亚Atlassian(Atlassian)公司的产品。Atlassian JIRA Server是一套缺陷跟踪管理系统的服务器版本。该系统主要用于对工作中各类问题、缺陷进行跟踪管理。Atlassian JIRA Data Center是Atlassian JIRA的数据中心版本。Add Field是其中的一个字段添加模块。 Atlassian JIRA Server和Data Center 8.7.0之前版本中的Add Field模块存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意HTML或JavaScript代码。
Severity
Patch Name
Atlassian JIRA Server和Data Center Add Field模块跨站脚本漏洞的补丁
Patch Description
Atlassian JIRA Server和Atlassian JIRA Data Center都是澳大利亚Atlassian(Atlassian)公司的产品。Atlassian JIRA Server是一套缺陷跟踪管理系统的服务器版本。该系统主要用于对工作中各类问题、缺陷进行跟踪管理。Atlassian JIRA Data Center是Atlassian JIRA的数据中心版本。Add Field是其中的一个字段添加模块。 Atlassian JIRA Server和Data Center 8.7.0之前版本中的Add Field模块存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意HTML或JavaScript代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://jira.atlassian.com/browse/JRASERVER-70858

Reference
https://nvd.nist.gov/vuln/detail/CVE-2019-20900
Impacted products
Name
['Atlassian JIRA Server <8.7.0', 'Atlassian Jira Data Center <8.7.0']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-20900",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-20900"
    }
  },
  "description": "Atlassian JIRA Server\u548cAtlassian JIRA Data Center\u90fd\u662f\u6fb3\u5927\u5229\u4e9aAtlassian\uff08Atlassian\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Atlassian JIRA Server\u662f\u4e00\u5957\u7f3a\u9677\u8ddf\u8e2a\u7ba1\u7406\u7cfb\u7edf\u7684\u670d\u52a1\u5668\u7248\u672c\u3002\u8be5\u7cfb\u7edf\u4e3b\u8981\u7528\u4e8e\u5bf9\u5de5\u4f5c\u4e2d\u5404\u7c7b\u95ee\u9898\u3001\u7f3a\u9677\u8fdb\u884c\u8ddf\u8e2a\u7ba1\u7406\u3002Atlassian JIRA Data Center\u662fAtlassian JIRA\u7684\u6570\u636e\u4e2d\u5fc3\u7248\u672c\u3002Add Field\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u5b57\u6bb5\u6dfb\u52a0\u6a21\u5757\u3002\n\nAtlassian JIRA Server\u548cData Center 8.7.0\u4e4b\u524d\u7248\u672c\u4e2d\u7684Add Field\u6a21\u5757\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fHTML\u6216JavaScript\u4ee3\u7801\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://jira.atlassian.com/browse/JRASERVER-70858",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-50483",
  "openTime": "2020-09-01",
  "patchDescription": "Atlassian JIRA Server\u548cAtlassian JIRA Data Center\u90fd\u662f\u6fb3\u5927\u5229\u4e9aAtlassian\uff08Atlassian\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Atlassian JIRA Server\u662f\u4e00\u5957\u7f3a\u9677\u8ddf\u8e2a\u7ba1\u7406\u7cfb\u7edf\u7684\u670d\u52a1\u5668\u7248\u672c\u3002\u8be5\u7cfb\u7edf\u4e3b\u8981\u7528\u4e8e\u5bf9\u5de5\u4f5c\u4e2d\u5404\u7c7b\u95ee\u9898\u3001\u7f3a\u9677\u8fdb\u884c\u8ddf\u8e2a\u7ba1\u7406\u3002Atlassian JIRA Data Center\u662fAtlassian JIRA\u7684\u6570\u636e\u4e2d\u5fc3\u7248\u672c\u3002Add Field\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u5b57\u6bb5\u6dfb\u52a0\u6a21\u5757\u3002\r\n\r\nAtlassian JIRA Server\u548cData Center 8.7.0\u4e4b\u524d\u7248\u672c\u4e2d\u7684Add Field\u6a21\u5757\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fHTML\u6216JavaScript\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Atlassian JIRA Server\u548cData Center Add Field\u6a21\u5757\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Atlassian JIRA Server \u003c8.7.0",
      "Atlassian Jira Data Center \u003c8.7.0"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-20900",
  "serverity": "\u4f4e",
  "submitTime": "2020-07-13",
  "title": "Atlassian JIRA Server\u548cData Center Add Field\u6a21\u5757\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…