First published: Wed Jul 01 2020(Updated: )
The attachment download resource in Atlassian Jira Server and Data Center The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a rdf content type.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <8.5.5 | |
Atlassian Jira Data Center | >=8.6.0<8.8.2 | |
Atlassian Jira Data Center | >=8.9.0<8.9.1 | |
Atlassian Jira Server | >=8.6.0<8.8.2 | |
Atlassian Jira Server | >=8.9.0<8.9.1 | |
Atlassian Jira Software Data Center | <8.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4025 is a vulnerability in Atlassian Jira Server and Data Center that allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) attack.
Atlassian Jira Server and Data Center versions before 8.5.5, 8.6.0 to 8.8.2, and 8.9.0 to 8.9.1 are affected.
CVE-2020-4025 has a severity rating of medium with a CVSS score of 4.8.
An attacker can exploit CVE-2020-4025 by injecting arbitrary HTML or JavaScript through a Cross-Site Scripting (XSS) attack on the attachment download resource in Atlassian Jira Server and Data Center.
Yes, Atlassian has released patches for the affected versions. It is recommended to update to the patched versions to mitigate the vulnerability.