First published: Mon Jun 01 2020(Updated: )
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <7.13.16 | |
Atlassian Jira Data Center | >=8.0.0<8.5.5 | |
Atlassian Jira Data Center | >=8.6.0<8.8.1 | |
Atlassian Jira Server | >=8.0.0<8.5.5 | |
Atlassian Jira Server | >=8.6.0<8.8.1 | |
Atlassian Jira Software Data Center | <7.13.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-4021.
Affected versions are before 8.5.5 and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center.
The severity of CVE-2020-4021 is medium with a severity value of 5.4.
CVE-2020-4021 allows remote attackers to inject arbitrary HTML or JavaScript via a cross-site scripting (XSS) vulnerability in the XML export view.
To fix CVE-2020-4021, update your Atlassian Jira Server or Data Center to versions 8.5.5 or 8.8.1.