First published: Wed Jul 01 2020(Updated: )
The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a vnd.wap.xhtml+xml content type.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <8.5.5 | |
Atlassian Jira Data Center | >=8.6.0<8.8.2 | |
Atlassian Jira Data Center | >=8.9.0<8.9.1 | |
Atlassian Jira Server | >=8.6.0<8.8.2 | |
Atlassian Jira Server | >=8.9.0<8.9.1 | |
Atlassian Jira Software Data Center | <8.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4024 is a vulnerability in Atlassian Jira Server and Data Center that allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in issue attachments.
CVE-2020-4024 affects Atlassian Jira Server versions before 8.5.5, and Jira Data Center versions from 8.6.0 to 8.8.2, and from 8.9.0 to 8.9.1.
CVE-2020-4024 has a severity rating of medium, with a CVSS score of 5.4.
Remote attackers can exploit CVE-2020-4024 by uploading issue attachments containing malicious HTML or JavaScript code, which will be executed when other users download the attachments.
Yes, Atlassian has released patches to fix CVE-2020-4024. Users should upgrade to Jira Server 8.5.5 or higher, or Jira Data Center 8.8.2, 8.9.1, or higher to mitigate the vulnerability.