First published: Mon Sep 21 2020(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.5.8 | |
Atlassian Jira Data Center | >=8.6.0<8.11.1 | |
Atlassian Jira Server | <8.5.8 | |
Atlassian Jira Server | >=8.6.0<8.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-14179.
The severity rating of CVE-2020-14179 is medium.
Remote unauthenticated attackers can exploit CVE-2020-14179 in Atlassian Jira by viewing custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint.
Versions before 8.5.8 and from 8.6.0 to 8.11.1 of Atlassian Jira Server and Data Center are affected by CVE-2020-14179.
Yes, upgrading to version 8.5.8 or higher for Atlassian Jira Server and Data Center will fix CVE-2020-14179.