First published: Fri May 11 2018(Updated: )
The issue collector in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the error message of custom fields when an invalid value is specified.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.6.6 | |
Atlassian Jira Server | >=7.7.0<7.7.4 | |
Atlassian Jira Server | >=7.8.0<7.8.4 | |
Atlassian Jira Server | >=7.9.0<7.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5230 is rated as a medium severity vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To fix CVE-2018-5230, you should upgrade to Jira versions 7.6.6, 7.7.4, 7.8.4, or 7.9.2 or later.
CVE-2018-5230 enables remote attackers to inject arbitrary HTML or JavaScript, facilitating Cross-Site Scripting attacks.
CVE-2018-5230 affects Jira versions before 7.6.6, and versions between 7.7.0 and 7.7.4, 7.8.0 and 7.8.4, and 7.9.0 and 7.9.2.
Yes, user data may be at risk through exploitation of the Cross-Site Scripting vulnerability in CVE-2018-5230.