First published: Wed Jan 27 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.13.3 | |
Atlassian Data Center | >=8.14.0<8.14.1 | |
Atlassian JIRA | <8.13.3 | |
Atlassian Jira Server | >=8.14.0<8.14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-26070.
The severity rating of CVE-2021-26070 is 7.2 (high).
Affected versions of Atlassian Jira Server and Data Center are before version 8.13.3 and from version 8.14.0 to 8.14.1.
Remote attackers can exploit this vulnerability to bypass behind-the-firewall protection and access app-linked resources.
More information about this vulnerability can be found at: https://jira.atlassian.com/browse/JRASERVER-72029.