cve-2022-36799
Vulnerability from cvelistv5
Published
2022-08-01 01:15
Modified
2024-10-03 18:44
Severity ?
EPSS score ?
Summary
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/JRASERVER-73582 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/JRASERVER-73582 | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Jira Server |
Version: unspecified < 8.13.19 Version: 8.14.0 < unspecified Version: unspecified < 8.20.7 Version: 8.21.0 < unspecified Version: unspecified < 8.22.1 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T10:14:28.495Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jira.atlassian.com/browse/JRASERVER-73582", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "jira_server", vendor: "atlassian", versions: [ { lessThan: "8.13.19", status: "affected", version: "0", versionType: "custom", }, { lessThan: "8.20.7", status: "affected", version: "8.14.0", versionType: "custom", }, { lessThan: "8.22.1", status: "affected", version: "8.21.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "jira_data_center", vendor: "atlassian", versions: [ { lessThan: "8.13.19", status: "affected", version: "0", versionType: "custom", }, { lessThan: "8.20.7", status: "affected", version: "8.14.0", versionType: "custom", }, { lessThan: "8.22.1", status: "affected", version: "8.21.0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2022-36799", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-03T18:37:25.567188Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-94", description: "CWE-94 Improper Control of Generation of Code ('Code Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-03T18:44:09.152Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Jira Server", vendor: "Atlassian", versions: [ { lessThan: "8.13.19", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.14.0", versionType: "custom", }, { lessThan: "8.20.7", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.21.0", versionType: "custom", }, { lessThan: "8.22.1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Jira Data Center", vendor: "Atlassian", versions: [ { lessThan: "8.13.19", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.14.0", versionType: "custom", }, { lessThan: "8.20.7", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "unspecified", status: "affected", version: "8.21.0", versionType: "custom", }, { lessThan: "8.22.1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2022-07-29T00:00:00", descriptions: [ { lang: "en", value: "This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.", }, ], problemTypes: [ { descriptions: [ { description: "Remote Code Execution (RCE)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-01T01:15:12", orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", shortName: "atlassian", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://jira.atlassian.com/browse/JRASERVER-73582", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@atlassian.com", DATE_PUBLIC: "2022-07-29T00:00:00", ID: "CVE-2022-36799", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Jira Server", version: { version_data: [ { version_affected: "<", version_value: "8.13.19", }, { version_affected: ">=", version_value: "8.14.0", }, { version_affected: "<", version_value: "8.20.7", }, { version_affected: ">=", version_value: "8.21.0", }, { version_affected: "<", version_value: "8.22.1", }, ], }, }, { product_name: "Jira Data Center", version: { version_data: [ { version_affected: "<", version_value: "8.13.19", }, { version_affected: ">=", version_value: "8.14.0", }, { version_affected: "<", version_value: "8.20.7", }, { version_affected: ">=", version_value: "8.21.0", }, { version_affected: "<", version_value: "8.22.1", }, ], }, }, ], }, vendor_name: "Atlassian", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Remote Code Execution (RCE)", }, ], }, ], }, references: { reference_data: [ { name: "https://jira.atlassian.com/browse/JRASERVER-73582", refsource: "MISC", url: "https://jira.atlassian.com/browse/JRASERVER-73582", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", assignerShortName: "atlassian", cveId: "CVE-2022-36799", datePublished: "2022-08-01T01:15:12.567055Z", dateReserved: "2022-07-26T00:00:00", dateUpdated: "2024-10-03T18:44:09.152Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-36799\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2022-08-01T11:15:14.347\",\"lastModified\":\"2024-11-21T07:13:46.837\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.\"},{\"lang\":\"es\",\"value\":\"Este problema se presenta para documentar que ha sido implementado una mejora de seguridad en la forma en que Jira Server y Data Center usan las plantillas. Las versiones afectadas de Atlassian Jira Server y Data Center permitían a atacantes remotos con permisos de administrador del sistema ejecutar código arbitrario por medio de una inyección de plantillas conllevando a una ejecución de código remota (RCE) en la funcionalidad Email Templates. En este caso, la mejora de seguridad consistía en proteger contra el uso de la biblioteca XStream para poder ejecutar código arbitrario en las plantillas de velocidad. Las versiones afectadas son anteriores a versión 8.13.19, desde versión 8.14.0 hasta 8.20.7, y desde versión 8.21.0 hasta 8.22.1\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.13.19\",\"matchCriteriaId\":\"CE4EE8F3-9CE4-4445-9935-FC1B5A8FD6B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.14.0\",\"versionEndExcluding\":\"8.20.7\",\"matchCriteriaId\":\"759134BE-47F5-45E0-B18E-94FF129E6374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.21.0\",\"versionEndExcluding\":\"8.22.1\",\"matchCriteriaId\":\"3DCE6AFE-0C67-4624-85FC-D6ACF1A826E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.13.19\",\"matchCriteriaId\":\"4D102165-274E-41AC-B173-C71B5DBF82E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.14.0\",\"versionEndExcluding\":\"8.20.7\",\"matchCriteriaId\":\"8B2E23C8-FCA4-40E2-A8C2-B4BC0CC1FA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.21.0\",\"versionEndExcluding\":\"8.22.1\",\"matchCriteriaId\":\"481155C1-F6A6-440E-BE95-FA31AD0DC162\"}]}]}],\"references\":[{\"url\":\"https://jira.atlassian.com/browse/JRASERVER-73582\",\"source\":\"security@atlassian.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/JRASERVER-73582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://jira.atlassian.com/browse/JRASERVER-73582\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T10:14:28.495Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-36799\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-03T18:37:25.567188Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*\"], \"vendor\": \"atlassian\", \"product\": \"jira_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.13.19\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"8.20.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.21.0\", \"lessThan\": \"8.22.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*\"], \"vendor\": \"atlassian\", \"product\": \"jira_data_center\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.13.19\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"8.20.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.21.0\", \"lessThan\": \"8.22.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94 Improper Control of Generation of Code ('Code Injection')\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-03T18:44:02.676Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Atlassian\", \"product\": \"Jira Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.13.19\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.20.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.21.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.22.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Atlassian\", \"product\": \"Jira Data Center\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.13.19\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.14.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.20.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.21.0\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.22.1\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2022-07-29T00:00:00\", \"references\": [{\"url\": \"https://jira.atlassian.com/browse/JRASERVER-73582\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Remote Code Execution (RCE)\"}]}], \"providerMetadata\": {\"orgId\": \"f08a6ab8-ed46-4c22-8884-d911ccfe3c66\", \"shortName\": \"atlassian\", \"dateUpdated\": \"2022-08-01T01:15:12\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"8.13.19\", \"version_affected\": \"<\"}, {\"version_value\": \"8.14.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.20.7\", \"version_affected\": \"<\"}, {\"version_value\": \"8.21.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.22.1\", \"version_affected\": \"<\"}]}, \"product_name\": \"Jira Server\"}, {\"version\": {\"version_data\": [{\"version_value\": \"8.13.19\", \"version_affected\": \"<\"}, {\"version_value\": \"8.14.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.20.7\", \"version_affected\": \"<\"}, {\"version_value\": \"8.21.0\", \"version_affected\": \">=\"}, {\"version_value\": \"8.22.1\", \"version_affected\": \"<\"}]}, \"product_name\": \"Jira Data Center\"}]}, \"vendor_name\": \"Atlassian\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://jira.atlassian.com/browse/JRASERVER-73582\", \"name\": \"https://jira.atlassian.com/browse/JRASERVER-73582\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Remote Code Execution (RCE)\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2022-36799\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@atlassian.com\", \"DATE_PUBLIC\": \"2022-07-29T00:00:00\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2022-36799\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-03T18:44:09.152Z\", \"dateReserved\": \"2022-07-26T00:00:00\", \"assignerOrgId\": \"f08a6ab8-ed46-4c22-8884-d911ccfe3c66\", \"datePublished\": \"2022-08-01T01:15:12.567055Z\", \"assignerShortName\": \"atlassian\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.