First published: Wed Feb 13 2019(Updated: )
The labels widget gadget in Atlassian Jira before version 7.6.11 and from version 7.7.0 before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the rendering of retrieved content from a url location that could be manipulated by the up_projectid widget preference setting.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Core | <7.6.11 | |
Atlassian Server | >=7.7.0<7.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20232 is classified as a high severity vulnerability due to its potential for remote code execution via cross site scripting.
To fix CVE-2018-20232, upgrade Jira to version 7.6.11 or to any version between 7.7.0 and 7.13.1, inclusive.
CVE-2018-20232 affects Atlassian Jira versions prior to 7.6.11 and versions between 7.7.0 and 7.13.1.
CVE-2018-20232 is a cross site scripting (XSS) vulnerability that allows attackers to inject arbitrary HTML or JavaScript.
Yes, CVE-2018-20232 can be exploited remotely, allowing attackers to manipulate URL content and execute scripts.