First published: Tue Sep 14 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view whitelist rules via a Broken Access Control vulnerability in the /rest/whitelist/<version>/check endpoint. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.13.3 | |
Atlassian Data Center | =8-14 | |
Atlassian Jira | <8.13.3 | |
Atlassian Jira | =8-14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20101 is a vulnerability in Atlassian Jira Server and Data Center that allows anonymous remote attackers to view whitelist rules.
The CVE-2019-20101 vulnerability can be exploited by sending a request to the /rest/whitelist/<version>/check endpoint.
Versions before 8.13.3 of Atlassian Jira Server and Data Center, and versions from 8.14.0 before 8.14.1 are affected by CVE-2019-20101.
CVE-2019-20101 has a severity rating of 5.3 (medium).
To fix the CVE-2019-20101 vulnerability, it is recommended to upgrade to version 8.13.3 or higher of Atlassian Jira Server and Data Center.