First published: Tue Oct 06 2020(Updated: )
Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance's Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.13.18 | |
Atlassian JIRA | <7.13.18 | |
Atlassian JIRA | >=8.0.0<8.5.9 | |
Atlassian JIRA | >=8.0.0<8.5.9 | |
Atlassian JIRA | >=8.6.0<8.12.1 | |
Atlassian JIRA | >=8.6.0<8.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14183 is an Information Disclosure vulnerability in Jira Server & Data Center that allows a remote attacker with limited privileges to view a Jira instance's Support Entitlement Number (SEN) through the HTTP Response headers.
Versions before 7.13.18, from 8.0.0 to 8.5.9, and from 8.6.0 to 8.12.1 of Jira Server & Data Center are affected by CVE-2020-14183.
CVE-2020-14183 has a severity rating of 4.3 (medium).
A remote attacker with limited (non-admin) privileges can exploit CVE-2020-14183 to view a Jira instance's Support Entitlement Number (SEN) through the HTTP Response headers.
Yes, updating to version 7.13.18 or later, version 8.5.9 or later, or version 8.12.1 or later of Jira Server & Data Center fixes CVE-2020-14183.