First published: Thu Apr 01 2021(Updated: )
The SetFeatureEnabled.jspa resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to enable and disable Jira Software configuration via a cross-site request forgery (CSRF) vulnerability.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.13 | |
Atlassian JIRA | <8.5.13 | |
Atlassian Jira Data Center | >=8.6.0<8.13.5 | |
Atlassian Jira Data Center | >=8.14.0<8.15.1 | |
Atlassian Jira Server | >=8.6.0<8.13.5 | |
Atlassian Jira Server | >=8.14.0<8.15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26071 is a vulnerability that allows remote attackers to enable and disable Jira Software configuration via a cross-site request forgery (CSRF).
CVE-2021-26071 affects Atlassian Data Center, Atlassian JIRA, Atlassian Jira Data Center, and Atlassian Jira Server.
CVE-2021-26071 has a severity rating of low (3.5).
CVE-2021-26071 can be exploited by remote anonymous attackers using cross-site request forgery (CSRF) techniques.
You can find more information about CVE-2021-26071 on the Atlassian Jira bug tracker: https://jira.atlassian.com/browse/JRASERVER-72233