First published: Tue Sep 10 2019(Updated: )
Various templates of the Optimization plugin in Jira before version 7.13.6, and from version 8.0.0 before version 8.4.0 allow remote attackers who have permission to manage custom fields to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a custom field.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Server | >=7.13.0<7.13.6 | |
Atlassian Jira Server | >=8.0.0<8.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8450 has been classified as a medium severity vulnerability due to its potential for exploitation via XSS.
To fix CVE-2019-8450, upgrade your Jira installation to version 7.13.6 or to version 8.4.0 or later.
CVE-2019-8450 allows remote attackers to execute arbitrary HTML or JavaScript code through an XSS vulnerability.
CVE-2019-8450 affects Jira versions prior to 7.13.6 and from 8.0.0 to prior to 8.4.0, specifically those templates of the Optimization plugin.
No, CVE-2019-8450 can only be exploited by remote attackers who have permission to manage custom fields.