First published: Mon Nov 30 2020(Updated: )
Affected versions of Automation for Jira - Server allowed remote attackers to read and render files as mustache templates in files inside the WEB-INF/classes & <jira-installation>/jira/bin directories via a template injection vulnerability in Jira smart values using mustache partials. The affected versions are those before version 7.1.15.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Automation For Jira | <7.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14193 is classified as a critical vulnerability due to its potential for remote exploitation.
To fix CVE-2020-14193, upgrade Automation for Jira to a version greater than 7.1.15.
Versions of Automation for Jira prior to 7.1.15 are affected by CVE-2020-14193.
CVE-2020-14193 is a template injection vulnerability that allows remote attackers to read and render files.
Yes, CVE-2020-14193 can lead to unauthorized file access and data exposure for affected users.