First published: Mon Aug 30 2021(Updated: )
The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.18 | |
Atlassian JIRA | <8.5.18 | |
Atlassian Jira Data Center | >=8.6.0<8.13.10 | |
Atlassian Jira Data Center | >=8.14.0<8.18.2 | |
Atlassian Jira Server | >=8.6.0<8.13.10 | |
Atlassian Jira Server | >=8.14.0<8.18.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39111 is a vulnerability in Atlassian Jira Server and Data Center that allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability.
CVE-2021-39111 allows remote attackers to inject malicious code into Atlassian Jira Server and Data Center, potentially compromising user data and system integrity.
CVE-2021-39111 has a severity rating of medium.
Atlassian Jira Server versions 8.6.0 to 8.13.10 and 8.14.0 to 8.18.2, as well as Atlassian Jira Data Center versions 8.6.0 to 8.13.10 and 8.14.0 to 8.18.2 are affected by CVE-2021-39111.
To fix the CVE-2021-39111 vulnerability, users are advised to upgrade Atlassian Jira Server and Data Center to version 8.5.18, 8.13.10, or 8.18.2 or later.