First published: Tue Sep 14 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to discover the usernames of users via an enumeration vulnerability in the password reset page. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.1.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.5.10 | |
Atlassian Data Center | >=8.6.0<8.13.1 | |
Atlassian JIRA | <8.5.10 | |
Atlassian Jira Server | >=8.6.0<8.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-39125.
The severity of CVE-2021-39125 is medium (5.3).
CVE-2021-39125 allows anonymous remote attackers to discover the usernames of users through an enumeration vulnerability on the password reset page in affected versions of Atlassian Jira Server and Data Center.
The affected versions of Atlassian Jira Server and Data Center are before version 8.5.10, and from version 8.6.0 before 8.13.1.
Yes, upgrading to version 8.5.10 or higher, or version 8.13.1 or higher, will fix CVE-2021-39125.