First published: Mon Mar 22 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to download temporary files and enumerate project keys via an Information Disclosure vulnerability in the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.11 | |
Atlassian Data Center | >=8.6.0<8.13.3 | |
Atlassian Jira | <8.5.11 | |
Atlassian Data Center | >=8.14.0<8.15.0 | |
Atlassian Server | >=8.6.0<8.13.3 | |
Atlassian Server | >=8.14.0<8.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26069 is a vulnerability in Atlassian Jira Server and Data Center that allows unauthenticated remote attackers to download temporary files and enumerate project keys.
The affected versions are before version 8.5.11 for Atlassian Jira Server and before version 8.6.0 to 8.13.3 for Atlassian Jira Data Center.
CVE-2021-26069 has a severity rating of medium (5.3).
CVE-2021-26069 allows unauthenticated remote attackers to exploit an Information Disclosure vulnerability in the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint to download temporary files and enumerate project keys.
Yes, upgrading to a version that is not affected by the vulnerability is the recommended fix for CVE-2021-26069.