cve-2020-36239
Vulnerability from cvelistv5
Published
2021-07-29 10:12
Modified
2024-10-17 15:25
Severity ?
EPSS score ?
20.32%
(0.95151)
Summary
Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html | Patch, Vendor Advisory | |
security@atlassian.com | https://jira.atlassian.com/browse/JRASERVER-72566 | Issue Tracking, Vendor Advisory | |
security@atlassian.com | https://jira.atlassian.com/browse/JSDSERVER-8454 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/JRASERVER-72566 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/JSDSERVER-8454 | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Jira Data Center |
Version: 6.3.0 < unspecified Version: unspecified < 8.5.16 Version: 8.6.0 < unspecified Version: unspecified < 8.13.8 Version: 8.14.0 < unspecified Version: unspecified < 8.17.0 |
||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:23:09.858Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jira.atlassian.com/browse/JSDSERVER-8454", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jira.atlassian.com/browse/JRASERVER-72566", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "jira_data_center", vendor: "atlassian", versions: [ { lessThan: "8.5.16", status: "affected", version: "6.3.0", versionType: "custom", }, { lessThan: "8.13.8", status: "affected", version: "8.6.0", versionType: "custom", }, { lessThan: "8.17.0", status: "affected", version: "8.14.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*", ], defaultStatus: "unknown", product: "jira_service_desk", vendor: "atlassian", versions: [ { lessThan: "4.5.16", status: "affected", version: "2.0.2", versionType: "custom", }, { lessThan: "4.13.8", status: "affected", version: "4.6.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", ], defaultStatus: "unknown", product: "jira_service_management", vendor: "atlassian", versions: [ { lessThan: "4.17.0", status: "affected", version: "4.14.0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2020-36239", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-17T15:18:39.926455Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-862", description: "CWE-862 Missing Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-17T15:25:47.384Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Jira Data Center", vendor: "Atlassian", versions: [ { lessThan: "unspecified", status: "affected", version: "6.3.0", versionType: "custom", }, { lessThan: "8.5.16", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.6.0", versionType: "custom", }, { lessThan: "8.13.8", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.14.0", versionType: "custom", }, { lessThan: "8.17.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Jira Core Data Center", vendor: "Atlassian", versions: [ { lessThan: "unspecified", status: "affected", version: "6.3.0", versionType: "custom", }, { lessThan: "8.5.16", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.6.0", versionType: "custom", }, { lessThan: "8.13.8", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.14.0", versionType: "custom", }, { lessThan: "8.17.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Jira Software Data Center", vendor: "Atlassian", versions: [ { lessThan: "unspecified", status: "affected", version: "6.3.0", versionType: "custom", }, { lessThan: "8.5.16", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.6.0", versionType: "custom", }, { lessThan: "8.13.8", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.14.0", versionType: "custom", }, { lessThan: "8.17.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Jira Service Management Data Center", vendor: "Atlassian", versions: [ { lessThan: "unspecified", status: "affected", version: "2.0.2", versionType: "custom", }, { lessThan: "4.5.16", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "4.6.0", versionType: "custom", }, { lessThan: "4.13.8", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "4.14.0", versionType: "custom", }, { lessThan: "4.17.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2021-07-21T00:00:00", descriptions: [ { lang: "en", value: "Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-862", description: "CWE-862: Missing Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-07-29T10:12:42", orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", shortName: "atlassian", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://jira.atlassian.com/browse/JSDSERVER-8454", }, { tags: [ "x_refsource_MISC", ], url: "https://jira.atlassian.com/browse/JRASERVER-72566", }, { tags: [ "x_refsource_MISC", ], url: "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@atlassian.com", DATE_PUBLIC: "2021-07-21T17:00:00", ID: "CVE-2020-36239", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Jira Data Center", version: { version_data: [ { version_affected: ">=", version_value: "6.3.0", }, { version_affected: "<", version_value: "8.5.16", }, { version_affected: ">=", version_value: "8.6.0", }, { version_affected: "<", version_value: "8.13.8", }, { version_affected: ">=", version_value: "8.14.0", }, { version_affected: "<", version_value: "8.17.0", }, ], }, }, { product_name: "Jira Core Data Center", version: { version_data: [ { version_affected: ">=", version_value: "6.3.0", }, { version_affected: "<", version_value: "8.5.16", }, { version_affected: ">=", version_value: "8.6.0", }, { version_affected: "<", version_value: "8.13.8", }, { version_affected: ">=", version_value: "8.14.0", }, { version_affected: "<", version_value: "8.17.0", }, ], }, }, { product_name: "Jira Software Data Center", version: { version_data: [ { version_affected: ">=", version_value: "6.3.0", }, { version_affected: "<", version_value: "8.5.16", }, { version_affected: ">=", version_value: "8.6.0", }, { version_affected: "<", version_value: "8.13.8", }, { version_affected: ">=", version_value: "8.14.0", }, { version_affected: "<", version_value: "8.17.0", }, ], }, }, { product_name: "Jira Service Management Data Center", version: { version_data: [ { version_affected: ">=", version_value: "2.0.2", }, { version_affected: "<", version_value: "4.5.16", }, { version_affected: ">=", version_value: "4.6.0", }, { version_affected: "<", version_value: "4.13.8", }, { version_affected: ">=", version_value: "4.14.0", }, { version_affected: "<", version_value: "4.17.0", }, ], }, }, ], }, vendor_name: "Atlassian", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-862: Missing Authorization", }, ], }, ], }, references: { reference_data: [ { name: "https://jira.atlassian.com/browse/JSDSERVER-8454", refsource: "MISC", url: "https://jira.atlassian.com/browse/JSDSERVER-8454", }, { name: "https://jira.atlassian.com/browse/JRASERVER-72566", refsource: "MISC", url: "https://jira.atlassian.com/browse/JRASERVER-72566", }, { name: "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html", refsource: "MISC", url: "https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", assignerShortName: "atlassian", cveId: "CVE-2020-36239", datePublished: "2021-07-29T10:12:42.879604Z", dateReserved: "2021-01-27T00:00:00", dateUpdated: "2024-10-17T15:25:47.384Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2020-36239\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2021-07-29T11:15:07.477\",\"lastModified\":\"2024-11-21T05:29:07.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.\"},{\"lang\":\"es\",\"value\":\"Jira Data Center, Jira Core Data Center, Jira Software Data Center desde la versión 6.3.0 antes de la versión 8.5.16, desde la versión 8.6.0 antes de la versión 8.13.8, desde la 8.14.0 antes de la versión 8.17.0 y Jira Service Management Data Center desde la versión 2.0.2 antes de la versión 4.5.16, desde la versión 4.6.0 antes de la versión 4.13.8, y desde la versión 4.14.0 antes de la versión 4.17.0 expusieron un servicio de red Ehcache RMI que los atacantes, que pueden conectarse al servicio, en el puerto 40001 y potencialmente 40011[0][1], podrían ejecutar código arbitrario de su elección en Jira a través de la deserialización debido a una vulnerabilidad de falta de autenticación. Aunque Atlassian sugiere encarecidamente que se restrinja el acceso a los puertos Ehcache sólo a las instancias del Centro de Datos, las versiones fijas de Jira requerirán ahora un secreto compartido para permitir el acceso al servicio Ehcache. [0] En las versiones de Jira Data Center, Jira Core Data Center y Jira Software Data Center anteriores a la versión 7.13.1, el puerto del objeto Ehcache puede ser asignado aleatoriamente. [1] En las versiones de Jira Service Management Data Center anteriores a la versión 3.16.1, el puerto del objeto Ehcache puede asignarse aleatoriamente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@atlassian.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.3.0\",\"versionEndExcluding\":\"8.5.16\",\"matchCriteriaId\":\"639EC886-D23E-4CF7-B729-731F3C4B3C10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.6.0\",\"versionEndExcluding\":\"8.13.8\",\"matchCriteriaId\":\"20E7C6BB-8490-4C91-9DC2-6FB630125179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.14.0\",\"versionEndExcluding\":\"8.17.0\",\"matchCriteriaId\":\"8B9DCF77-9D9D-4988-BEF3-14C9DAA43814\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*\",\"versionStartIncluding\":\"2.0.2\",\"versionEndExcluding\":\"4.5.16\",\"matchCriteriaId\":\"FB4FAD82-049D-449F-BA66-E3EB444D265A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*\",\"versionStartIncluding\":\"4.6.0\",\"versionEndExcluding\":\"4.13.8\",\"matchCriteriaId\":\"8F5D807A-ADF1-405B-828C-B8F4ACB3D7B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*\",\"versionStartIncluding\":\"4.14.0\",\"versionEndExcluding\":\"4.17.0\",\"matchCriteriaId\":\"76485A7B-A00D-407D-84A8-FEE959DB970C\"}]}]}],\"references\":[{\"url\":\"https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html\",\"source\":\"security@atlassian.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/JRASERVER-72566\",\"source\":\"security@atlassian.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/JSDSERVER-8454\",\"source\":\"security@atlassian.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/JRASERVER-72566\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/JSDSERVER-8454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://jira.atlassian.com/browse/JSDSERVER-8454\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://jira.atlassian.com/browse/JRASERVER-72566\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T17:23:09.858Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-36239\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-17T15:18:39.926455Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\"], \"vendor\": \"atlassian\", \"product\": \"jira_data_center\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"8.5.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"lessThan\": \"8.13.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"8.17.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*\"], \"vendor\": \"atlassian\", \"product\": \"jira_service_desk\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.2\", \"lessThan\": \"4.5.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.6.0\", \"lessThan\": \"4.13.8\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*\"], \"vendor\": \"atlassian\", \"product\": \"jira_service_management\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.14.0\", \"lessThan\": \"4.17.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862 Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-17T15:25:41.528Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Atlassian\", \"product\": \"Jira Data Center\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.5.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.13.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.17.0\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Atlassian\", \"product\": \"Jira Core Data Center\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.5.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.13.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.17.0\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Atlassian\", \"product\": \"Jira Software Data Center\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.5.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.13.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.17.0\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Atlassian\", \"product\": \"Jira Service Management Data Center\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.2\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"4.5.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.6.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"4.13.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.14.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"4.17.0\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2021-07-21T00:00:00\", \"references\": [{\"url\": \"https://jira.atlassian.com/browse/JSDSERVER-8454\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://jira.atlassian.com/browse/JRASERVER-72566\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862: Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"f08a6ab8-ed46-4c22-8884-d911ccfe3c66\", \"shortName\": \"atlassian\", \"dateUpdated\": \"2021-07-29T10:12:42\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"6.3.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.5.16\", \"version_affected\": \"<\"}, {\"version_value\": \"8.6.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.13.8\", \"version_affected\": \"<\"}, {\"version_value\": \"8.14.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.17.0\", \"version_affected\": \"<\"}]}, \"product_name\": \"Jira Data Center\"}, {\"version\": {\"version_data\": [{\"version_value\": \"6.3.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.5.16\", \"version_affected\": \"<\"}, {\"version_value\": \"8.6.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.13.8\", \"version_affected\": \"<\"}, {\"version_value\": \"8.14.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.17.0\", \"version_affected\": \"<\"}]}, \"product_name\": \"Jira Core Data Center\"}, {\"version\": {\"version_data\": [{\"version_value\": \"6.3.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.5.16\", \"version_affected\": \"<\"}, {\"version_value\": \"8.6.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.13.8\", \"version_affected\": \"<\"}, {\"version_value\": \"8.14.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.17.0\", \"version_affected\": \"<\"}]}, \"product_name\": \"Jira Software Data Center\"}, {\"version\": {\"version_data\": [{\"version_value\": \"2.0.2\", \"version_affected\": \">=\"}, {\"version_value\": \"4.5.16\", \"version_affected\": \"<\"}, {\"version_value\": \"4.6.0\", \"version_affected\": \">=\"}, {\"version_value\": \"4.13.8\", \"version_affected\": \"<\"}, {\"version_value\": \"4.14.0\", \"version_affected\": \">=\"}, {\"version_value\": \"4.17.0\", \"version_affected\": \"<\"}]}, \"product_name\": \"Jira Service Management Data Center\"}]}, \"vendor_name\": \"Atlassian\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://jira.atlassian.com/browse/JSDSERVER-8454\", \"name\": \"https://jira.atlassian.com/browse/JSDSERVER-8454\", \"refsource\": \"MISC\"}, {\"url\": \"https://jira.atlassian.com/browse/JRASERVER-72566\", \"name\": \"https://jira.atlassian.com/browse/JRASERVER-72566\", \"refsource\": \"MISC\"}, {\"url\": \"https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html\", \"name\": \"https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-862: Missing Authorization\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-36239\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@atlassian.com\", \"DATE_PUBLIC\": \"2021-07-21T17:00:00\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2020-36239\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-17T15:25:47.384Z\", \"dateReserved\": \"2021-01-27T00:00:00\", \"assignerOrgId\": \"f08a6ab8-ed46-4c22-8884-d911ccfe3c66\", \"datePublished\": \"2021-07-29T10:12:42.879604Z\", \"assignerShortName\": \"atlassian\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.