First published: Mon Jul 16 2018(Updated: )
The IncomingMailServers resource in Atlassian JIRA Server before version 7.6.7, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3 and from version 7.10.0 before version 7.10.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the messagesThreshold parameter as the fix for CVE-2017-18039 was incomplete.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.6.7 | |
Atlassian Jira Server | >=7.7.0<7.7.5 | |
Atlassian Jira Server | >=7.8.0<7.8.5 | |
Atlassian Jira Server | >=7.9.0<7.9.3 | |
Atlassian Jira Server | >=7.10.0<7.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13387 has a medium severity rating due to the potential for remote attackers to inject arbitrary HTML.
To fix CVE-2018-13387, upgrade Atlassian JIRA Server to version 7.6.7 or any version above 7.7.5, 7.8.5, 7.9.3, or 7.10.2.
CVE-2018-13387 affects Atlassian JIRA Server versions before 7.6.7 and those between 7.7.0 to 7.7.5, 7.8.0 to 7.8.5, 7.9.0 to 7.9.3, and 7.10.0 to 7.10.2.
CVE-2018-13387 allows remote attackers to perform HTML injection attacks via the IncomingMailServers resource.
Yes, patches are included in the upgraded versions of Atlassian JIRA Server that address CVE-2018-13387.