First published: Sun Feb 14 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the ViewWorkflowSchemes.jspa and ListWorkflows.jspa endpoints. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <8.5.11 | |
Atlassian Jira Data Center | >=8.6.0<8.13.3 | |
Atlassian Jira Server | >=8.6.0<8.13.3 | |
Atlassian Jira Server | >=8.14.0<8.15.0 | |
Atlassian Jira Software Data Center | <8.5.11 | |
Atlassian Jira Software Data Center | >=8.14.0<8.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36236 is a Cross-Site Scripting (XSS) vulnerability in Atlassian Jira Server and Data Center.
CVE-2020-36236 affects Atlassian Jira Server versions before 8.5.11, from version 8.6.0 to 8.13.3, and from version 8.14.0 to 8.15.0.
CVE-2020-36236 affects Atlassian Jira Data Center versions from 8.6.0 to 8.13.3, and from 8.14.0 to 8.15.0.
CVE-2020-36236 has a severity value of 6.1, which is considered medium severity.
Yes, Atlassian has released fixes for CVE-2020-36236. Users should upgrade to a fixed version to mitigate the vulnerability.