First published: Wed Sep 08 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to enumerate the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint. The affected versions are before version 8.5.18, from version 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.18 | |
Atlassian JIRA | <8.5.18 | |
Atlassian Jira Data Center | >=8.6.0<8.13.10 | |
Atlassian Jira Data Center | >=8.14.0<8.18.2 | |
Atlassian Jira Server | >=8.6.0<8.13.10 | |
Atlassian Jira Server | >=8.14.0<8.18.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-39121.
The severity of CVE-2021-39121 is medium with a severity value of 4.3.
Affected versions of Atlassian Jira Server and Data Center are before version 8.5.18, from version 8.6.0 to 8.13.10, and from version 8.14.0 to 8.18.2.
An authenticated remote attacker can exploit CVE-2021-39121 by enumerating the keys of private Jira projects via an Information Disclosure vulnerability in the /rest/api/latest/projectvalidate/key endpoint.
Yes, you can find the reference for CVE-2021-39121 at https://jira.atlassian.com/browse/JRASERVER-72715.