First published: Thu Sep 16 2021(Updated: )
Affected versions of Atlassian Jira Server or Data Center using the Jira Service Management addon allow remote attackers with JIRA Administrators access to execute arbitrary Java code via a server-side template injection vulnerability in the Email Template feature. The affected versions of Jira Server or Data Center are before version 8.13.12, and from version 8.14.0 before 8.19.1.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.13.12 | |
Atlassian Jira Data Center | >=8.14.0<8.19.1 | |
Atlassian Jira Server | <8.13.12 | |
Atlassian Jira Server | >=8.14.0<8.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39128 is a server-side template injection vulnerability in the Email Template feature of Atlassian Jira Server or Data Center using the Jira Service Management addon.
CVE-2021-39128 allows remote attackers with JIRA Administrators access to execute arbitrary Java code.
Affected versions include Atlassian Jira Server 8.13.12 and earlier, Atlassian Jira Server 8.14.0 to 8.19.1, Atlassian Jira Data Center 8.13.12 and earlier, and Atlassian Jira Data Center 8.14.0 to 8.19.1.
The severity of CVE-2021-39128 is high, with a CVSS score of 7.2.
To fix CVE-2021-39128, it is recommended to upgrade to a version of Atlassian Jira Server or Data Center that is not affected by the vulnerability.