First published: Fri Jan 12 2018(Updated: )
The printable searchrequest issue resource in Atlassian Jira before version 7.2.12 and from version 7.3.0 before 7.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the jqlQuery query parameter.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.2.12 | |
Atlassian Jira Server | >=7.3.0<7.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14594 has a medium severity rating due to its potential for exploitation through cross-site scripting (XSS).
To fix CVE-2017-14594, upgrade Atlassian Jira to version 7.2.12 or from 7.3.0 to 7.6.1 or later.
CVE-2017-14594 allows remote attackers to inject arbitrary HTML or JavaScript, potentially compromising user data.
CVE-2017-14594 affects Atlassian Jira versions prior to 7.2.12 and versions from 7.3.0 up to but not including 7.6.1.
CVE-2017-14594 is a specific XSS vulnerability and while it may not directly relate to other CVEs, it is part of a broader category of web application security issues.