First published: Thu Apr 01 2021(Updated: )
The membersOf JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.13 | |
Atlassian JIRA | <8.5.13 | |
Atlassian Jira Data Center | >=8.6.0<8.13.5 | |
Atlassian Jira Data Center | >=8.14.0<8.15.1 | |
Atlassian Jira Server | >=8.6.0<8.13.5 | |
Atlassian Jira Server | >=8.14.0<8.15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36286 is a vulnerability that allows remote attackers to determine if a group exists and members of groups if they are assigned to publicly visible projects in Atlassian Jira Server and Data Center.
CVE-2020-36286 affects Atlassian Jira Server and Data Center versions prior to 8.5.13, from 8.6.0 to 8.13.5, and from 8.14.0 to 8.15.1.
CVE-2020-36286 has a severity rating of 5.3 (medium).
Remote attackers can exploit CVE-2020-36286 to determine the existence of groups and the members of groups if they are assigned to publicly visible projects.
Yes, updating Atlassian Jira Server and Data Center to version 8.5.13, 8.13.5, or 8.15.1 (or later) will fix CVE-2020-36286.