First published: Wed Feb 13 2019(Updated: )
The two-dimensional filter statistics gadget in Atlassian Jira before version 7.6.10, from version 7.7.0 before version 7.12.4, and from version 7.13.0 before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a saved filter when displayed on a Jira dashboard.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.6.10 | |
Atlassian Jira Server | >=7.7.0<=7.12.3 | |
Atlassian Jira Server | >=7.13.0<7.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13403 is classified as a high severity vulnerability due to its potential for remote code execution via XSS.
You can fix CVE-2018-13403 by upgrading Atlassian Jira to version 7.6.10 or later, or versions 7.12.4 and above.
CVE-2018-13403 can facilitate cross-site scripting (XSS) attacks, allowing attackers to inject arbitrary HTML or JavaScript.
CVE-2018-13403 affects Atlassian Jira versions prior to 7.6.10, versions from 7.7.0 to 7.12.3, and versions from 7.13.0 to 7.13.1.
Yes, CVE-2018-13403 can be exploited without user interaction, making it particularly dangerous for users of affected Jira installations.