First published: Tue Apr 10 2018(Updated: )
Various administrative external system import resources in Atlassian JIRA Server (including JIRA Core) before version 7.6.5, from version 7.7.0 before version 7.7.3, from version 7.8.0 before version 7.8.3 and before version 7.9.0 allow remote attackers to run import operations and to determine if an internal service exists through missing permission checks.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.6.5 | |
Atlassian Jira Server | >=7.7.0<7.7.3 | |
Atlassian Jira Server | >=7.8.0<7.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18101 has a medium severity rating, allowing unauthorized remote import operations.
To fix CVE-2017-18101, upgrade Atlassian JIRA to version 7.6.5 or any later versions above 7.7.3, 7.8.3, or 7.9.0.
CVE-2017-18101 affects versions of Atlassian JIRA before 7.6.5, 7.7.0 to 7.7.3, 7.8.0 to 7.8.3, and all versions prior to 7.9.0.
Yes, CVE-2017-18101 could allow attackers to determine if certain import operations can be executed, potentially exposing sensitive data.
CVE-2017-18101 poses a risk to system security by enabling unauthorized users to perform import operations, which may lead to further exploitation.