First published: Wed Aug 25 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.15 | |
Atlassian JIRA | <8.5.15 | |
Atlassian Jira Data Center | >=8.6.0<8.13.7 | |
Atlassian Jira Data Center | >=8.14.0<8.17.1 | |
Atlassian Jira Data Center | >=8.18.0<8.18.1 | |
Atlassian Jira Server | >=8.6.0<8.13.7 | |
Atlassian Jira Server | >=8.14.0<8.17.1 | |
Atlassian Jira Server | >=8.18.0<8.18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39112 is a vulnerability in Atlassian Jira Server and Data Center that allows remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature.
The affected versions of Atlassian Jira Server and Data Center are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1.
CVE-2021-39112 has a severity rating of 4.8, which is considered medium.
To fix CVE-2021-39112, you should update Atlassian Jira Server and Data Center to version 8.5.15 or above.
You can find more information about CVE-2021-39112 on the Atlassian Jira Server and Data Center official website.