First published: Wed May 12 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.13 | |
Atlassian JIRA | <8.5.13 | |
Atlassian Jira Data Center | >=8.6.0<8.13.5 | |
Atlassian Jira Data Center | >=8.14.0<8.15.1 | |
Atlassian Jira Server | >=8.6.0<8.13.5 | |
Atlassian Jira Server | >=8.14.0<8.15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36289 is an Information Disclosure vulnerability in Atlassian Jira Server and Data Center that allows an unauthenticated user to enumerate users.
CVE-2020-36289 has a severity level of 5.3 (medium).
Atlassian Jira Server and Data Center versions before 8.5.13, from 8.6.0 to 8.13.5, and from 8.14.0 to 8.15.1 are affected by CVE-2020-36289.
An unauthenticated user can exploit the CVE-2020-36289 vulnerability by accessing the QueryComponentRendererValue!Default.jspa endpoint to enumerate users in Atlassian Jira Server and Data Center.
Yes, the fix for CVE-2020-36289 is available in versions 8.5.13, 8.13.6, and 8.15.2 of Atlassian Jira Server and Data Center.