First published: Thu Apr 01 2021(Updated: )
The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.13 | |
Atlassian Jira | <8.5.13 | |
Atlassian Data Center | >=8.6.0<8.13.5 | |
Atlassian Data Center | >=8.14.0<8.15.1 | |
Atlassian Server | >=8.6.0<8.13.5 | |
Atlassian Server | >=8.14.0<8.15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36238 is a vulnerability in Jira Server and Data Center that allows remote anonymous attackers to determine if a username is valid or not.
CVE-2020-36238 has a severity rating of 5.3, which is considered medium.
Jira Server and Data Center versions before 8.5.13, 8.6.0 to 8.13.5, and 8.14.0 to 8.15.1 are affected by CVE-2020-36238.
To fix CVE-2020-36238, you should update your Jira Server or Data Center to version 8.5.13 or later.
You can find more information about CVE-2020-36238 on the Atlassian Jira issue page: https://jira.atlassian.com/browse/JRASERVER-72249