First published: Tue Jul 20 2021(Updated: )
Export HTML Report in Atlassian Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.14 | |
Atlassian JIRA | <8.5.14 | |
Atlassian Jira Data Center | >=8.6.0<8.13.6 | |
Atlassian Jira Data Center | >=8.14.0<8.16.1 | |
Atlassian Jira Server | >=8.6.0<8.13.6 | |
Atlassian Jira Server | >=8.14.0<8.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26083 is a vulnerability in Atlassian Jira Server and Jira Data Center that allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability.
The severity of CVE-2021-26083 is medium with a CVSS score of 5.4.
Atlassian Jira Server and Jira Data Center versions before 8.5.14, versions from 8.6.0 to 8.13.6, and versions from 8.14.0 to 8.16.1 are affected by CVE-2021-26083.
Remote attackers can exploit CVE-2021-26083 by injecting arbitrary HTML or JavaScript code through a Cross-Site Scripting (XSS) vulnerability in export HTML reports in Atlassian Jira Server and Jira Data Center.
Yes, the fix for CVE-2021-26083 is to upgrade to Atlassian Jira Server and Jira Data Center version 8.5.14 or later, or version 8.13.6 or later, or version 8.16.1 or later.