First published: Mon Aug 16 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.5.14 | |
Atlassian Jira Data Center | >=8.6.0<8.13.6 | |
Atlassian Jira Data Center | >=8.14.0<8.16.1 | |
Atlassian Jira Server | <8.5.14 | |
Atlassian Jira Server | >=8.6.0<8.13.6 | |
Atlassian Jira Server | >=8.14.0<8.16.1 | |
Atlassian Jira Server and Data Center |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2021-26086 is a path traversal vulnerability in the /WEB-INF/web.xml endpoint of Atlassian Jira Server and Data Center.
A remote attacker can read particular files on the affected Atlassian Jira Server and Data Center versions.
The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
Vulnerability CVE-2021-26086 has a severity rating of 5.3 (medium).
You can find more information about vulnerability CVE-2021-26086 at the following references: [Packet Storm Security](http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html) and [Atlassian Jira Issue Tracker](https://jira.atlassian.com/browse/JRASERVER-72695).