First published: Tue Oct 26 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian JIRA | <8.6.0 | |
Atlassian Jira Data Center | >=8.7.0<8.13.12 | |
Atlassian Jira Server | >=8.7.0<8.13.12 | |
Atlassian Jira Server | >=8.14.0<8.20.1 | |
Atlassian Jira Software Data Center | <8.6.0 | |
Atlassian Jira Software Data Center | >=8.14.0<8.20.1 | |
<8.6.0 | ||
>=8.7.0<8.13.12 | ||
>=8.7.0<8.13.12 | ||
>=8.14.0<8.20.1 | ||
<8.6.0 | ||
>=8.14.0<8.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-41308.
The affected software for this vulnerability includes Atlassian Jira Server, Atlassian Jira Data Center, and Atlassian Jira Software Data Center.
The severity rating of CVE-2021-41308 is medium.
An authenticated yet non-administrator attacker can exploit this vulnerability by editing the File Replication settings via the `ReplicationSettings!default.jspa` endpoint.
Versions of Atlassian Jira Server and Data Center before version 8.6.0, as well as versions between 8.7.0 and 8.13.12 (inclusive) for Atlassian Jira Data Center and versions between 8.14.0 and 8.20.1 (inclusive) for Atlassian Jira Server are vulnerable.