First published: Mon Sep 21 2020(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to impact the application's availability via a Regex-based Denial of Service (DoS) vulnerability in JQL version searching. The affected versions are before version 7.13.16; from version 7.14.0 before 8.5.7; from version 8.6.0 before 8.10.2; and from version 8.11.0 before 8.11.1.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Server | <7.13.16 | |
Atlassian Jira Server | >=7.14.0<8.5.7 | |
Atlassian Jira Server | >=8.6.0<8.10.2 | |
Atlassian Jira Server | >=8.11.0<8.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14177 has a medium severity rating which impacts the availability of Atlassian Jira Server and Data Center.
To fix CVE-2020-14177, upgrade to Atlassian Jira Server version 7.13.16 or later, or any version from 8.5.7 onward.
CVE-2020-14177 affects Atlassian Jira Server versions prior to 7.13.16 and versions between 7.14.0 and 8.5.7, and specific ranges in versions 8.6.0 to 8.10.2 and 8.11.0 to 8.11.1.
Yes, CVE-2020-14177 can be exploited by remote attackers through a Regex-based Denial of Service (DoS) attack.
The impact of CVE-2020-14177 on users could lead to a degradation of service and a complete application denial of service.