First published: Wed May 22 2019(Updated: )
The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Core | <7.13.3 | |
Atlassian Server | >=8.0.0<8.0.4 | |
Atlassian Server | >=8.1.0<8.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3403 is considered a high severity vulnerability due to its potential for allowing remote attackers to enumerate usernames.
To fix CVE-2019-3403, upgrade Jira to version 7.13.3 or to versions 8.0.4 and above, and to 8.1.1 or later.
CVE-2019-3403 enables attackers to perform user enumeration attacks which can lead to further exploitation.
If you are using any version of Jira prior to 7.13.3, or between 8.0.0 and 8.0.4 or between 8.1.0 and 8.1.1, then your version is affected by CVE-2019-3403.
CVE-2019-3403 can lead to unauthorized disclosure of usernames, which may compromise user privacy and security within the affected Jira environments.