First published: Thu Jan 21 2021(Updated: )
The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center before version 8.5.11, from 8.6.0 before 8.13.3, and from 8.14.0 before 8.15.0 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | >=8.5.10<8.5.11 | |
Atlassian Data Center | >=8.6.0<8.13.3 | |
Atlassian Jira Data Center | >=8.14.0<8.15.0 | |
Atlassian Jira Server | >=8.5.10<8.5.11 | |
Atlassian Jira Server | >=8.6.0<8.13.3 | |
Atlassian Jira Server | >=8.14.0<8.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29453 is a vulnerability in Jira Server and Jira Data Center that allows unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories.
The severity of CVE-2020-29453 is medium with a CVSS score of 5.3.
An attacker can exploit CVE-2020-29453 by sending a specially crafted request to the vulnerable server and reading arbitrary files.
Jira Server versions 8.5.10 to 8.5.11, 8.6.0 to 8.13.3, and 8.14.0 to 8.15.0, as well as Jira Data Center versions 8.6.0 to 8.13.3 and 8.14.0 to 8.15.0 are affected by CVE-2020-29453.
To mitigate CVE-2020-29453, update Jira Server or Jira Data Center to version 8.5.11, 8.15.0, or a later patch release.