First published: Fri Aug 24 2018(Updated: )
The ProfileLinkUserFormat component of Jira Server before version 7.6.8, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3 and from version 7.11.0 before version 7.11.2 allows remote attackers who can access & view an issue to obtain the email address of the reporter and assignee user of an issue despite the configured email visibility setting being set to hidden.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.6.8 | |
Atlassian Jira Server | >=7.7.0<7.7.5 | |
Atlassian Jira Server | >=7.8.0<7.8.5 | |
Atlassian Jira Server | >=7.9.0<7.9.3 | |
Atlassian Jira Server | >=7.10.0<7.10.3 | |
Atlassian Jira Server | >=7.11.0<7.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13391 is classified as a high severity vulnerability that allows remote attackers to exploit Jira Server.
To mitigate CVE-2018-13391, upgrade your Jira Server to version 7.6.8 or versions later than 7.7.5, 7.8.5, 7.9.3, 7.10.3, or 7.11.2.
CVE-2018-13391 affects Jira Server versions before 7.6.8 and from 7.7.0 before 7.7.5, 7.8.0 before 7.8.5, 7.9.0 before 7.9.3, 7.10.0 before 7.10.3, and 7.11.0 before 7.11.2.
It is not recommended to continue using an affected version of Jira Server due to the potential for remote exploitation.
CVE-2018-13391 is categorized as a remote code execution vulnerability affecting Jira Server.