First published: Thu Jan 17 2019(Updated: )
The Upload add-on resource in Atlassian Universal Plugin Manager before version 2.22.14 allows remote attackers who have system administrator privileges to read files, make network requests and perform a denial of service attack via an XML External Entity vulnerability in the parsing of atlassian plugin xml files in an uploaded JAR.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Universal Plugin Manager | <2.22.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20233 is considered a critical vulnerability due to its potential for remote exploitation and denial of service.
To fix CVE-2018-20233, upgrade Atlassian Universal Plugin Manager to version 2.22.14 or later.
System administrators can be exposed to risks of unauthorized file access and network requests if CVE-2018-20233 is not remediated.
Yes, CVE-2018-20233 can potentially allow attackers to read sensitive files, leading to data breaches.
CVE-2018-20233 is an XML External Entity (XXE) vulnerability that affects the parsing process.