First published: Tue Sep 14 2021(Updated: )
The Cross-Site Request Forgery (CSRF) failure retry feature of Atlassian Jira Server and Data Center before version 8.16.0 allows remote attackers who are able to trick a user into retrying a request to bypass CSRF protection and replay a crafted request.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.16.0 | |
Atlassian JIRA | <8.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-39124.
The title of the vulnerability is 'The Cross-Site Request Forgery (CSRF) failure retry feature of Atlassian Jira Server and Data Center...'
The Cross-Site Request Forgery (CSRF) failure retry feature of Atlassian Jira Server and Data Center before version 8.16.0 allows remote attackers who are able to trick a user into retrying a request to bypass CSRF protection and replay a crafted request.
The vulnerability affects Atlassian Jira Server and Data Center before version 8.16.0.
The severity of this vulnerability is medium with a CVSS score of 4.3.
An attacker can exploit this vulnerability by tricking a user into retrying a request, bypassing CSRF protection, and replaying a crafted request.
Yes, the fix for this vulnerability is included in Atlassian Jira Server and Data Center version 8.16.0.
You can find more information about this vulnerability on the Atlassian Jira Server and Data Center official website: https://jira.atlassian.com/browse/JRASERVER-72761.
This vulnerability belongs to CWE category 352.