First published: Wed Apr 14 2021(Updated: )
The issue navigation and search view in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before version 8.13.4, and from version 8.14.0 before version 8.15.1 allows remote attackers to inject arbitrary HTML or JavaScript via a DOM Cross-Site Scripting (XSS) vulnerability caused by parameter pollution.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.12 | |
Atlassian JIRA | <8.5.12 | |
Atlassian Jira Data Center | >=8.6.0<8.13.4 | |
Atlassian Jira Data Center | >=8.14.0<8.15.1 | |
Atlassian Jira Server | >=8.6.0<8.13.4 | |
Atlassian Jira Server | >=8.14.0<8.15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36288 is a vulnerability in Jira Server and Data Center that allows remote attackers to inject arbitrary HTML or JavaScript via a DOM Cross-Site Scripting (XSS) vulnerability.
CVE-2020-36288 can be exploited by remote attackers injecting arbitrary HTML or JavaScript via a DOM Cross-Site Scripting (XSS) vulnerability.
The severity of CVE-2020-36288 is medium with a CVSS score of 6.1.
Jira Server and Data Center versions before 8.5.12, between 8.6.0 to 8.13.4, and between 8.14.0 to 8.15.1 are affected by CVE-2020-36288.
To fix CVE-2020-36288, upgrade your Jira Server or Data Center to version 8.5.12 or higher, or apply the necessary security patches.