First published: Tue Apr 20 2010(Updated: )
Atlassian JIRA 3.12 through 4.1 allows remote authenticated administrators to execute arbitrary code by modifying the (1) attachment (aka attachments), (2) index (aka indexing), or (3) backup path and then uploading a file, as exploited in the wild in April 2010.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira | =3.12 | |
Atlassian Jira | =3.12.1 | |
Atlassian Jira | =3.12.2 | |
Atlassian Jira | =3.12.3 | |
Atlassian Jira | =3.13 | |
Atlassian Jira | =3.13.1 | |
Atlassian Jira | =3.13.2 | |
Atlassian Jira | =3.13.3 | |
Atlassian Jira | =3.13.4 | |
Atlassian Jira | =3.13.5 | |
Atlassian Jira | =4.0 | |
Atlassian Jira | =4.0.1 | |
Atlassian Jira | =4.0.2 | |
Atlassian Jira | =4.1 | |
=3.12 | ||
=3.12.1 | ||
=3.12.2 | ||
=3.12.3 | ||
=3.13 | ||
=3.13.1 | ||
=3.13.2 | ||
=3.13.3 | ||
=3.13.4 | ||
=3.13.5 | ||
=4.0 | ||
=4.0.1 | ||
=4.0.2 | ||
=4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1165 has a high severity rating due to the potential for remote code execution.
To fix CVE-2010-1165, upgrade to a patched version of Atlassian JIRA that addresses this vulnerability.
CVE-2010-1165 affects Atlassian JIRA versions 3.12 through 4.1.
Yes, CVE-2010-1165 can be exploited remotely by authenticated administrators.
CVE-2010-1165 allows for arbitrary code execution through file uploads.